thumbnail Diving Deeper into AI Package Hallucinations
thumbnail Tycoon 2FA: an in-depth analysis of the latest version of the AiTM phishing kit
thumbnail Large-Scale StrelaStealer Campaign in Early 2024
thumbnail The iSOON Disclosure: Exploring the Integrated Operations Platform
thumbnail Interesting Multi-Stage StopCrypt Ransomware Variant Propagating in the Wild
thumbnail The Architects of Evasion: a Crypters Threat Landscape
thumbnail The Anatomy of an ALPHA SPIDER Ransomware Attack
thumbnail NoName057(16) DDoSia project: 2024 updates and behavioural shifts
thumbnail Scattered Spider laying new eggs
thumbnail A first analysis of the i-Soon data leak
thumbnail Code injection or backdoor: A new look at Ivanti’s CVE-2021-44529
thumbnail Vulnerable Fortinet Devices: Low-hanging Fruit for Threat Actors
thumbnail Threat Intel Accelerates Detection & Response
thumbnail New MacOS Backdoor Written in Rust Shows Possible Link with Windows Ransomware Group
thumbnail Zero Day Initiative — CVE-2023-46263: Ivanti Avalanche Arbitrary File Upload Vulnerability
thumbnail Ransomware Retrospective 2024: Unit 42 Leak Site Analysis
thumbnail New Go-based Malware Loader Discovered I Arctic Wolf
thumbnail Attack of the week: Airdrop tracing – A Few Thoughts on Cryptographic Engineering
thumbnail CVE-2023-27532
thumbnail Analyzing DPRK's SpectralBlur
thumbnail CVE-2023-46747 : Unauthenticated Remote Code Execution in F5 BIG-IP - Malware Analysis - Malware Analysis, News and Indicators
thumbnail Objective-See's Blog
thumbnail Android Banking Trojan Chameleon can now bypass any Biometric Authentication
thumbnail The Curious Case of Predatory Sparrow
thumbnail Rhadamanthys v0.5.0 - a deep dive into the stealer’s components
thumbnail CVE-2023-50164
thumbnail Scanning Danger: Unmasking the Threats of Quishing
thumbnail Star Blizzard increases sophistication and evasion in ongoing attacks
thumbnail Cyber Threats affecting "International Geneva"
thumbnail Into the Trash: Analyzing LitterDrifter
thumbnail Understanding the Phobos affiliate structure and activity
thumbnail C3RB3R Ransomware | Ongoing Exploitation of CVE-2023-22518 Targets Unpatched Confluence Servers  - SentinelOne
thumbnail Nothing new, still broken, insecure by default since then: Python's e-mail libraries and certificate verification
thumbnail Jamf Threat Labs Discovers Malware from BlueNoroff
thumbnail Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction
thumbnail CVE-2023-46604
thumbnail CVE-2023-46747
thumbnail GHOSTPULSE haunts victims using defense evasion bag o' tricks
thumbnail FakeUpdateRU Chrome Update Infection Spreads Trojan Malware
thumbnail Triangulation: validators, post-compromise activity and modules | Securelist
thumbnail CVE-2023-38831 Exploited by Pro-Russia Hacking Groups in RU-UA Conflict Zone for Credential Harvesting Operations
thumbnail Disclosing the BLOODALCHEMY backdoor
thumbnail 90s Vulns In 90s Software (Exim) - Is the Sky Falling?
thumbnail Mirai Botnet's New Wave: hailBot,kiraiBot, catDDoS, and Their Fierce Onslaught - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.
thumbnail New Python NodeStealer Goes Beyond Facebook Credentials, Now Stealing All Browser Cookies and Login Credentials
thumbnail Compromised Microsoft Key: More Impactful Than We Thought
thumbnail What's in a NoName? Researchers see a lone-wolf DDoS group
thumbnail Exposing DuckTail
thumbnail Adversary On The Defense: ANTIBOT.PW
thumbnail #FuckStalkerware pt. 3 - ownspy got, well, owned
thumbnail CVE-2023-36844 And Friends: RCE In Juniper Devices
thumbnail Lazarus Group exploits ManageEngine vulnerability to deploy QuiteRAT
thumbnail Unpacking the Threats Within: The Hidden Dangers of .zip Domains
thumbnail Into the tank with Nitrogen
thumbnail Malicious Batch File (*.bat) Disguised as a Document Viewer Being Distributed (Kimsuky)
thumbnail Unmasking the Meduza Stealer: Comprehensive Analysis & Countermeasures
thumbnail BlueNoroff | How DPRK’s macOS RustBucket Seeks to Evade Analysis and Detection -
thumbnail Clop Ransomware: History, Timeline, And Adversary Simulation
thumbnail Malware Execution Method Using DNS TXT Record
thumbnail Tracing Ransomware Threat Actors Through Stylometric Analysis and Chat Log Examination
thumbnail PindOS: New JavaScript Dropper Delivering Bumblebee and IcedID
thumbnail IoT Under Siege: The Anatomy of the Latest Mirai Campaign Leveraging Multiple IoT Exploits
thumbnail Cadet Blizzard emerges as a novel and distinct Russian threat actor | Microsoft Security Blog
thumbnail The Phantom Menace: Brute Ratel remains rare and targeted
thumbnail Analysis of CVE-2023-27997 and Clarifications on Volt Typhoon Campaign
thumbnail Xortigate, or CVE-2023-27997 - The Rumoured RCE That Was
thumbnail Analysis of CVE-2023-29336 Win32k Privilege Escalation
thumbnail Trustwave Action Response: Zero Day Exploitation of MOVEit (CVE-2023-34362)
thumbnail GobRAT malware written in Go language targeting Linux routers
thumbnail Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft
thumbnail Zero Day Initiative — CVE-2023-24941: Microsoft Network File System Remote Code Execution
thumbnail Mercenary mayhem: A technical analysis of Intellexa's PREDATOR spyware
thumbnail Akira Ransomware is “bringin’ 1988 back”
thumbnail infosec company owned completely by 4chan user
thumbnail New phishing-as-a-service tool “Greatness” already seen in the wild
thumbnail The malware threat landscape: NodeStealer, DuckTail, and more
thumbnail Magecart threat actor rolls out convincing modal forms
thumbnail Analysis of Pre-Auth RCE in Sophos Web Appliance (CVE-2023-1671)
thumbnail 'RustBucket' malware targets macOS
thumbnail 3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible
thumbnail in2al5d p3in4er is Almost Completely Undetectable
thumbnail LockBit for Mac | How Real is the Risk of macOS Ransomware?
thumbnail QBot banker delivered through business correspondence
thumbnail Analyzing an arm64 mach-O version of LockBit
thumbnail Vice Society: A Tale of Victim Data Exfiltration via PowerShell, aka Stealing off the Land
thumbnail Nokoyawa ransomware attacks with Windows zero-day
thumbnail Balada Injector: Synopsis of a Massive Ongoing WordPress Malware Campaign
thumbnail MERCURY and DEV-1084: Destructive attack on hybrid environment - Microsoft Security Blog
thumbnail Cyble — Demystifying Money Message Ransomware 
thumbnail 3CX Desktop App Compromised (CVE-2023-29059)
thumbnail Cyble — Cl0p Ransomware: Active Threat Plaguing Businesses Worldwide
thumbnail 3CX VoIP Software Compromise & Supply Chain Threats
thumbnail Patch Tuesday -> Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours
thumbnail Prometei botnet improves modules and exhibits new capabilities in recent updates
thumbnail A Noteworthy Threat: How Cybercriminals are Abusing OneNote
thumbnail Iron Tiger’s SysUpdate Reappears, Adds Linux Targeting
thumbnail Hunting for Honkbox | Multistage macOS Cryptominer May Still Be Hiding
thumbnail Lumma Stealer targets YouTubers via Spear-phishing Email | by S2W | S2W BLOG | Feb, 2023 | Medium
thumbnail PureCrypter targets government entities through Discord - Blog | Menlo Security
thumbnail TA569: SocGholish and Beyond
thumbnail EXFILTRATOR-22 - An Emerging Post-Exploitation Framework
thumbnail Havoc Across the Cyberspace
thumbnail Investigating Intrusions From Intriguing Exploits
thumbnail Sliver Malware With BYOVD Distributed Through Sunlogin Vulnerability Exploitations - ASEC BLOG
thumbnail ‘InTheBox’ Web Injects Targeting Android Banking Applications Worldwide
thumbnail Chinese PlugX Malware Hidden in Your USB Devices?
thumbnail The Titan Stealer: Notorious Telegram Malware Campaign
thumbnail Following the LNK metadata trail
thumbnail Darth Vidar: The Dark Side of Evolving Threat Infrastructure
thumbnail Batloader Malware Abuses Legitimate Tools Uses Obfuscated JavaScript Files in Q4 2022 Attacks
thumbnail New CatB Ransomware Employs 2-Year Old DLL Hijacking Technique To Evade Detection
thumbnail Shc Linux Malware Installing CoinMiner
thumbnail The Mac Malware of 2022 👾
thumbnail New YouTube Bot Malware Spotted Stealing User’s Sensitive Information
thumbnail Pure coder offers multiple malware for sale in Darkweb forums
thumbnail New RisePro Stealer distributed by the prominent PrivateLoader
thumbnail Shlayer Malware: Continued Use of Flash Updates
thumbnail L’art de l’évasion How Shlayer hides its configuration inside Apple proprietary DMG files
thumbnail Threat Spotlight: XLLing in Excel - threat actors using malicious add-ins
thumbnail Raspberry Robin Malware Targets Telecom, Governments
thumbnail Custom-Branded Ransomware: The Vice Society Group and the Threat of Outsourced Development - SentinelOne
thumbnail An infostealer comes to town: Dissecting a highly evasive malware targeting Italy
thumbnail New Ransomware Strains Emerging from Leaked Conti’s Source Code  
thumbnail Meddler-in-the-Middle Phishing Attacks Explained MitM
thumbnail CVE-2022-41040 and CVE-2022-41082 – zero-days in MS Exchange
thumbnail GoTrim: Go-based Botnet Actively Brute Forces WordPress Websites
thumbnail Mallox Ransomware showing signs of Increased Activity
thumbnail Pulling the Curtains on Azov Ransomware: Not a Skidsware but Polymorphic Wiper - Check Point Research
thumbnail Hitching a ride with Mustang Panda
thumbnail New MuddyWater Threat: Old Kitten; New Tricks
thumbnail Blowing Cobalt Strike Out of the Water With Memory Analysis
thumbnail Preparing for a Russian cyber offensive against Ukraine this winter
thumbnail Aurora: a rising stealer flying under the radar
thumbnail Technical Analysis of the RedLine Stealer
thumbnail AXLocker, Octocrypt, and Alice: Leading a new wave of Ransomware Campaigns
thumbnail New RapperBot Campaign – We Know What You Bruting for this Time
thumbnail BumbleBee Zeros in on Meterpreter
thumbnail Exploring ZIP Mark-of-the-Web Bypass Vulnerability (CVE-2022-41049)
thumbnail PNG Steganography Hides Backdoor
thumbnail Massive ois[.]is Black Hat Redirect Malware Campaign
thumbnail The Case of Cloud9 Chrome Botnet
thumbnail Analysis of a Remote Code Execution (RCE) Vulnerability in Cobalt Strike 4.7.1
thumbnail Reverse Engineering the Apple MultiPeer Connectivity Framework
thumbnail Archive Sidestepping: Emotet Botnet Pushing Self-Unlocking Password-Protected RAR
thumbnail Cyble Phishing ERMAC Android Malware Increasingly Active
thumbnail New PHP Variant of Ducktail Infostealer Targeting Facebook Business Accounts
thumbnail Fake Ransomware Infection Under widespread
thumbnail Bumblebee: increasing its capacity and evolving its TTPs
thumbnail In the footsteps of the Fancy Bear: PowerPoint mouse-over event abused to deliver Graphite implants
thumbnail GRU: Rise of the (Telegram) MinIOns
thumbnail Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime
thumbnail Azure Cloud Shell Command Injection Stealing User’s Access Tokens
thumbnail Threat Alert: New Malware in the Cloud By TeamTNT
thumbnail Six months into Breached: The legacy of RaidForums?
thumbnail Credential Gathering From Third-Party Software
thumbnail Malvertising on Microsoft Edge's News Feed pushes tech support scams
thumbnail Bumblebee Returns with New Infection Technique
thumbnail Dead or Alive? An Emotet Story
thumbnail Shikitega - New stealthy malware targeting Linux
thumbnail Mirai Variant MooBot Targeting D-Link Devices
thumbnail SafeBreach Uncovers New Remote Access Trojan (RAT)
thumbnail Malicious Cookie Stuffing Chrome Extensions with 1.4 Million Users
thumbnail PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain Attacks
thumbnail THREAT ANALYSIS REPORT: Bumblebee Loader – The High Road to Enterprise Domain Control
thumbnail CVE-2022-27925
thumbnail Reservations Requested: TA558 Targets Hospitality and Travel
thumbnail Making Sense of the Killnet, Russia’s Favorite Hacktivists
thumbnail A Detailed Analysis of the RedLine Stealer
thumbnail LockBit Ransomware Group Augments Its Latest Variant, LockBit 3.0, With BlackMatter Capabilities
thumbnail [CVE-2022-34918] A crack in the Linux firewall
thumbnail Joker, Facestealer and Coper banking malwares on Google Play store
thumbnail CVE-2022-30333
thumbnail The forgotten SUAVEEYEFUL FreeBSD software implant of the EQUATION GROUP
thumbnail Microsoft Plans to Eliminate Face Analysis Tools in Push for ‘Responsible A.I.’
thumbnail BRATA is evolving into an Advanced Persistent Threat
thumbnail ASyncRat surpasses Dridex, TrickBot and Emotet to become dominant email threat
thumbnail A closer look at Eternity Malware
thumbnail Google Online Security Blog: The Package Analysis Project: Scalable detection of malicious open source packages
thumbnail AcidRain | A Modem Wiper Rains Down on Europe
thumbnail Lapsus$: when kiddies play in the big league
thumbnail An update on the threat landscape
thumbnail Cyber Realism in a Time of War
thumbnail The Bvp47 - a Top-tier Backdoor of US NSA Equation Group
thumbnail Cyber-attack on ICRC: What we know
thumbnail Objective-See's Blog
thumbnail SysJoker analyzing the first (macOS) malware of 2022!