thumbnail Introducing ToyMaker, an initial access broker working in cahoots with double extortion gangs
thumbnail Weathering the storm: In the midst of a Typhoon
thumbnail New TorNet backdoor seen in widespread campaign
thumbnail Akira ransomware continues to evolve
thumbnail Simple Mail Transfer Pirates: How threat actors are abusing third-party infrastructure to send spam
thumbnail How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions
thumbnail How do cryptocurrency drainer phishing scams work?
thumbnail LilacSquid: The stealthy trilogy of PurpleInk, InkBox and InkLoader
thumbnail ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices
thumbnail GhostSec’s joint ransomware operation and evolution of their arsenal
thumbnail Threat actors leverage document publishing sites for ongoing credential and session token theft
thumbnail Understanding the Phobos affiliate structure and activity
thumbnail Active exploitation of Cisco IOS XE Software Web Management User Interface vulnerability
thumbnail Lazarus Group exploits ManageEngine vulnerability to deploy QuiteRAT
thumbnail Uncovering weaknesses in Apple macOS and VMWare vCenter: 12 vulnerabilities in RPC implementation
thumbnail Mercenary mayhem: A technical analysis of Intellexa's PREDATOR spyware
thumbnail New phishing-as-a-service tool “Greatness” already seen in the wild
thumbnail Emotet resumes spam operations, switches to OneNote
thumbnail Prometei botnet improves modules and exhibits new capabilities in recent updates
thumbnail New MortalKombat ransomware and Laplas Clipper malware threats deployed in financially motivated campaign
thumbnail Following the LNK metadata trail
thumbnail Threat Spotlight: XLLing in Excel - threat actors using malicious add-ins
thumbnail Threat Spotlight: Cyber Criminal Adoption of IPFS for Phishing, Malware Campaigns
thumbnail Alchimist: A new attack framework in Chinese for Mac, Linux and Windows
thumbnail MagicRAT: Lazarus’ latest gateway into victim networks
thumbnail Comprehensive Threat Intelligence: Cisco Talos shares insights related to recent cyber attack on Cisco
thumbnail Attackers leveraging Dark Utilities "C2aaS" platform in malware campaigns
thumbnail Manjusaka: A Chinese sibling of Sliver and Cobalt Strike
thumbnail Iranian linked conglomerate MuddyWater comprised of regionally focused subgroups