PhishingSecurity Analyzing the vulnerability landscape in Q3 2024 by admin December 6, 2024 by admin December 6, 2024 Q3 2024 saw multiple vulnerabilities discovered in Windows and Linux subsystems that are not… 0 FacebookTwitterPinterestEmail
PrivacySecurity Analyzing the first UEFI bootkit for Linux by admin November 28, 2024 by admin November 28, 2024 Over the past few years, the UEFI threat landscape, particularly that of UEFI bootkits,… 0 FacebookTwitterPinterestEmail
PhishingSecurity Analyzing the infamous infostealer’s backend by admin November 9, 2024 by admin November 9, 2024 On October 28th, 2024, the Dutch National police, alongside the FBI, Eurojust, and several… 0 FacebookTwitterPinterestEmail
PhishingSecurity Analyzing the Awaken Likho APT group implant: new tools and techniques by admin October 24, 2024 by admin October 24, 2024 Introduction In July 2021, a campaign was launched primarily targeting Russian government agencies and… 0 FacebookTwitterPinterestEmail
PhishingSecurity Analyzing the familiar tools used by the Crypt Ghouls hacktivists by admin October 23, 2024 by admin October 23, 2024 Last December, we discovered a new group targeting Russian businesses and government agencies with… 0 FacebookTwitterPinterestEmail