
Watch out for these traps lurking in search results
A detailed report on the traps lurking in search engine results, their tactics, and recommendations for mitigation.

Slow Pisces Targets Developers With Coding Challenges and Introduces New Customized Python Malware
A detailed report on Slow Pisces’ campaign targeting cryptocurrency developers with customized Python malware, its TTPs, and recommendations for mitigation.

Smishing Triad: Chinese eCrime Group Targets 121+ Countries, Introduces New Banking Phishing Kit
A detailed report on the global SMS phishing campaign launched by the Chinese eCrime group Smishing Triad, targeting over 121 countries. Learn about their tactics, the new ‘Lighthouse’ phishing kit, and recommendations for mitigation.

Exploitation of CLFS zero-day leads to ransomware activity
A detailed threat report on the exploitation of a CLFS zero-day vulnerability leading to ransomware activity, attributed to Storm-2460. Includes mitigation strategies and detection methods.

CrazyHunter: The Rising Threat of Open-Source Ransomware
A detailed report on the CrazyHunter ransomware attack, its tactics, techniques, and procedures (TTPs), and recommendations for mitigating open-source ransomware threats.

How ToddyCat tried to hide behind AV software
A detailed analysis of how the ToddyCat APT group uses advanced techniques to evade detection and execute payloads, along with recommendations for mitigation.