thumbnail Leaked LockBit builder in a real-life incident response case | Securelist
thumbnail Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks | Trend Micro (US)
thumbnail Operation Triangulation: The last (hardware) mystery
thumbnail StripedFly: Perennially flying under the radar
thumbnail Dissecting TriangleDB, a Triangulation spyware implant
thumbnail DNS changer in malicious mobile app used by Roaming Mantis
thumbnail Stolen certificates in two waves of ransomware and wiper attacks
thumbnail LV Ransomware Exploits ProxyShell in Attack on a Jordan-based Company
thumbnail Malicious Tor Browser spreads through YouTube
thumbnail Kimsuky’s GoldDragon cluster and its C2 operations | Securelist
thumbnail Kaspersky report on Luna and Black Basta ransomware
thumbnail The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs