Blog

  1. Home
  2. /
  3. Blog
New Version of Triada Spreads Embedded in Firmware of Android Devices

New Version of Triada Spreads Embedded in Firmware of Android Devices

A detailed report on the new version of Triada Trojan spreading through infected Android device firmware, its capabilities, geographical distribution, and recommendations for mitigation.

April 26, 2025
0 Comments
SnakeKeylogger A Multistage Info Stealer Malware Campaign

SnakeKeylogger A Multistage Info Stealer Malware Campaign

A detailed analysis of the SnakeKeylogger malware campaign, its infection methods, advanced evasion techniques, and recommendations for mitigation.

April 25, 2025
0 Comments
Introducing ToyMaker: A New Initial Access Broker Threat

Introducing ToyMaker: A New Initial Access Broker Threat

A comprehensive threat report on ToyMaker, an initial access broker exploiting vulnerable systems exposed to the internet, deploying LAGTOY backdoor for persistent access and control.

April 24, 2025
0 Comments
Threat Infrastructure Uncovered Before Activation

Threat Infrastructure Uncovered Before Activation

A detailed report on a dormant infrastructure exhibiting characteristics of APT34 (OilRig), including shared SSH keys, structured websites, and decoy HTTP behavior. Learn about detection strategies and recommendations for mitigation.

April 23, 2025
0 Comments
Case of Attacks Targeting MS-SQL Servers to Install Ammyy Admin

Case of Attacks Targeting MS-SQL Servers to Install Ammyy Admin

A detailed report on recent attacks targeting MS-SQL servers to install Ammyy Admin, including TTPs and mitigation strategies.

April 23, 2025
0 Comments
Akira Ransomware Road To Glory | Blog | Dark Atlas

Akira Ransomware Road To Glory | Blog | Dark Atlas

A detailed report on the Akira ransomware group’s activities, their impact on over 250 organizations, and recommendations for mitigating the threat.

April 22, 2025
0 Comments
How Lumma Stealer sneaks into organizations

How Lumma Stealer sneaks into organizations

A comprehensive report on Lumma Stealer, its tactics, techniques, procedures (TTPs), and recommendations for mitigation to protect individuals and organizations from this sophisticated information-stealing malware.

April 22, 2025
0 Comments
Downloader Malware Written in JPHP Interpreter

Downloader Malware Written in JPHP Interpreter

A detailed report on a newly discovered downloader malware utilizing JPHP, its methods of operation, potential impacts, and recommendations for mitigation.

April 18, 2025
0 Comments

Share this:

Like this:

Like Loading...