Blog

  1. Home
  2. /
  3. Blog
Raven Stealer Unmasked Telegram-Based Data Exfiltration

Raven Stealer Unmasked Telegram-Based Data Exfiltration

A detailed report on Raven Stealer, its techniques, and recommendations for mitigation.

July 28, 2025
0 Comments
ToolShell An All You Can Eat Buffet For Threat Actors

ToolShell An All You Can Eat Buffet For Threat Actors

A comprehensive threat report on ToolShell, detailing its capabilities, implications, and recommendations for mitigation.

July 26, 2025
0 Comments
AI-Generated Malware in Panda Image Hides Persistent Linux Threat

AI-Generated Malware in Panda Image Hides Persistent Linux Threat

A detailed report on the AI-generated Linux malware campaign called Koske, its techniques, and recommendations for mitigation.

July 25, 2025
0 Comments
New MacOS ZuRu Variant Discovered

New MacOS ZuRu Variant Discovered

A detailed report on the new MacOS.ZuRu variant, its tactics, techniques, and procedures (TTPs), and recommendations for mitigation.

July 24, 2025
0 Comments
Back to Business Lumma Stealer Returns with Stealthier Methods

Back to Business Lumma Stealer Returns with Stealthier Methods

A detailed report on the resurgence of Lumma Stealer with stealthier methods, its techniques, and recommendations for mitigation.

July 23, 2025
0 Comments
Actively Exploited SharePoint Vulnerabilities

Actively Exploited SharePoint Vulnerabilities

A detailed report on actively exploited SharePoint vulnerabilities CVE-2025-53770 and CVE-2025-53771, their impact, and recommendations for mitigation.

July 22, 2025
0 Comments
Pay2Key’s Resurgence Iranian Cyber Warfare Targets the West

Pay2Key’s Resurgence Iranian Cyber Warfare Targets the West

A report on Pay2Key’s resurgence as a ransomware-as-a-service operation targeting Western organizations, its tactics, techniques, and procedures (TTPs), and recommendations for mitigation.

July 11, 2025
0 Comments
June 2025 Trends Report on Phishing Emails

June 2025 Trends Report on Phishing Emails

A detailed report on the latest trends in phishing emails and recommendations for mitigation.

July 10, 2025
0 Comments