A detailed report on Raven Stealer, its techniques, and recommendations for mitigation.
A comprehensive threat report on ToolShell, detailing its capabilities, implications, and recommendations for mitigation.
A detailed report on the AI-generated Linux malware campaign called Koske, its techniques, and recommendations for mitigation.
A detailed report on the new MacOS.ZuRu variant, its tactics, techniques, and procedures (TTPs), and recommendations for mitigation.
A detailed report on the resurgence of Lumma Stealer with stealthier methods, its techniques, and recommendations for mitigation.
A detailed report on actively exploited SharePoint vulnerabilities CVE-2025-53770 and CVE-2025-53771, their impact, and recommendations for mitigation.
A report on Pay2Key’s resurgence as a ransomware-as-a-service operation targeting Western organizations, its tactics, techniques, and procedures (TTPs), and recommendations for mitigation.
A detailed report on the latest trends in phishing emails and recommendations for mitigation.