A detailed report on the new version of Triada Trojan spreading through infected Android device firmware, its capabilities, geographical distribution, and recommendations for mitigation.
A detailed analysis of the SnakeKeylogger malware campaign, its infection methods, advanced evasion techniques, and recommendations for mitigation.
A comprehensive threat report on ToyMaker, an initial access broker exploiting vulnerable systems exposed to the internet, deploying LAGTOY backdoor for persistent access and control.
A detailed report on a dormant infrastructure exhibiting characteristics of APT34 (OilRig), including shared SSH keys, structured websites, and decoy HTTP behavior. Learn about detection strategies and recommendations for mitigation.
A detailed report on recent attacks targeting MS-SQL servers to install Ammyy Admin, including TTPs and mitigation strategies.
A detailed report on the Akira ransomware group’s activities, their impact on over 250 organizations, and recommendations for mitigating the threat.
A comprehensive report on Lumma Stealer, its tactics, techniques, procedures (TTPs), and recommendations for mitigation to protect individuals and organizations from this sophisticated information-stealing malware.
A detailed report on a newly discovered downloader malware utilizing JPHP, its methods of operation, potential impacts, and recommendations for mitigation.