Threat Report STORM 2603 A detailed analysis of previous ransomware operations by the threat actor group STORM 2603. Threat Overview Storm 2603 is a sophisticated threat actor group known for its involvement in various ransomware operations.
Continue ReadingBlog
APT28’s New Arsenal LAMEHUG The First AI-Powered Malware
Threat Report LAMEHUG A sophisticated AI-powered malware designed for advanced persistent threats (APTs) Threat Overview LAMEHUG is an advanced AI-powered malware developed by the threat actor group APT28. This malware leverages artificial intelligence to enhance its
Continue ReadingXWorm V6 Advanced Evasion and AMSI Bypass Capabilities Revealed
Threat Report XWORM V6 New advanced evasion techniques and AMSI bypass capabilities revealed in XWorm version 6.0 Threat Overview In September 2024, Netskope Threat Labs reported on the XWorm malware and its infection chain. After nearly
Continue ReadingThe Covert Operators Playbook Infiltration of Global Telecom Networks
Threat Report The Covert Operator's Playbook: Infiltration of Global Telecom Networks A detailed analysis of the infiltration tactics used by a sophisticated actor group targeting global telecom networks. Threat Overview The Covert Operator's Playbook is a
Continue ReadingRaven Stealer Unmasked Telegram-Based Data Exfiltration
Threat Report RAVEN STEALER UNMASKED: TELEGRAM-BASED DATA EXFILTRATION A sophisticated information-stealing malware targeting Chromium-based browsers. Threat Overview Raven Stealer is a modern, lightweight information-stealing malware developed in Delphi and C++. It specifically targets Chromium-based browsers to
Continue ReadingToolShell An All You Can Eat Buffet For Threat Actors
Threat Report TOOLSHELL A comprehensive threat report detailing the capabilities and implications of a new cyber threat. Threat Overview ToolShell is an emerging cyber threat that provides a wide array of tools for malicious actors, making
Continue ReadingAI-Generated Malware in Panda Image Hides Persistent Linux Threat
Threat Report KOSKE A sophisticated Linux malware campaign leveraging AI-assisted development to exploit misconfigured servers and install backdoors. Threat Overview The Koske malware campaign represents a significant advancement in cyber threats, utilizing AI-generated techniques to create
Continue ReadingNew MacOS ZuRu Variant Discovered
Threat Report New MacOS.ZuRu Variant A sophisticated malware targeting macOS systems with advanced evasion techniques. Threat Overview The New MacOS.ZuRu Variant is a recently discovered threat that targets macOS systems. This variant employs advanced evasion techniques
Continue ReadingBack to Business Lumma Stealer Returns with Stealthier Methods
Threat Report LUMMA STEALER A sophisticated information stealer malware that has returned with enhanced stealth techniques. Threat Overview The Lumma Stealer is a highly advanced information-stealing malware that has recently resurfaced with more refined and stealthier
Continue ReadingActively Exploited SharePoint Vulnerabilities
Threat Report CVE-2025-53770 and CVE-2025-53771: Actively Exploited SharePoint Vulnerabilities A critical threat report published by AlienVault on 2025-07-22T09:04:10.561Z detailing two actively exploited vulnerabilities in Microsoft SharePoint Servers. Threat Overview The threat report highlights two critical vulnerabilities,
Continue Reading