Posts tagged Malware

The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit

Threat Research

The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit

Ivan Feigl's avatar

Ivan Feigl

Inside Russian Market: Uncovering the Botnet Empire

Threat Research

Inside Russian Market: Uncovering the Botnet Empire

Alexandra Blia's avatar
Maor Weinberger's avatar

Alexandra Blia, Maor Weinberger

An Earth-Shattering Kaboom: Bringing a Physical ICS Penetration Testing Environment to Life (Part 2)

Threat Research

An Earth-Shattering Kaboom: Bringing a Physical ICS Penetration Testing Environment to Life (Part 2)

Anna Katarina Quinn's avatar

Anna Katarina Quinn

An Earth-Shattering Kaboom: Bringing a Physical ICS Penetration Testing Environment to Life (Part 1)

Threat Research

An Earth-Shattering Kaboom: Bringing a Physical ICS Penetration Testing Environment to Life (Part 1)

Anna Katarina Quinn's avatar

Anna Katarina Quinn

Emerging Trends in AI-Related Cyberthreats in 2025: Impacts on Organizational Cybersecurity

Threat Research

Emerging Trends in AI-Related Cyberthreats in 2025: Impacts on Organizational Cybersecurity

Jeremy Makowski's avatar

Jeremy Makowski

Filch Stealer: A new infostealer leveraging old techniques

Threat Research

Filch Stealer: A new infostealer leveraging old techniques

Ivan Feigl's avatar

Ivan Feigl

BlackSuit Continues Social Engineering Attacks in Wake of Black Basta’s Internal Conflict

Vulnerabilities and Exploits

BlackSuit Continues Social Engineering Attacks in Wake of Black Basta’s Internal Conflict

Tyler McGraw's avatar

Tyler McGraw

NSIS Abuse and sRDI Shellcode: Anatomy of the Winos 4.0 Campaign

Vulnerabilities and Exploits

NSIS Abuse and sRDI Shellcode: Anatomy of the Winos 4.0 Campaign

Anna Širokova's avatar
Ivan Feigl's avatar

Anna Širokova, Ivan Feigl

Modular Java Backdoor Dropped in Cleo Exploitation Campaign

Detection and Response

Modular Java Backdoor Dropped in Cleo Exploitation Campaign

Christiaan Beek's avatar

Christiaan Beek

Black Basta Ransomware Campaign Drops Zbot, DarkGate, and Custom Malware

Detection and Response

Black Basta Ransomware Campaign Drops Zbot, DarkGate, and Custom Malware

Tyler McGraw's avatar

Tyler McGraw

Why Cybercriminals Are Not Necessarily Embracing AI

Industry Trends

Why Cybercriminals Are Not Necessarily Embracing AI

Christiaan Beek's avatar

Christiaan Beek

New “CleverSoar” Installer Targets Chinese and Vietnamese Users

Vulnerabilities and Exploits

New “CleverSoar” Installer Targets Chinese and Vietnamese Users

Natalie Zargarov's avatar

Natalie Zargarov

A Bag of RATs: VenomRAT vs. AsyncRAT

Threat Research

A Bag of RATs: VenomRAT vs. AsyncRAT

Anna Širokova's avatar

Anna Širokova

LodaRAT: Established Malware, New Victim Patterns

Threat Research

LodaRAT: Established Malware, New Victim Patterns

Natalie Zargarov's avatar

Natalie Zargarov

Malware Campaign Lures Users With Fake W2 Form

Vulnerabilities and Exploits

Malware Campaign Lures Users With Fake W2 Form

Tom Elkins's avatar

Tom Elkins

Ongoing Malvertising Campaign Leads to Ransomware

Detection and Response

Ongoing Malvertising Campaign Leads to Ransomware

Tyler McGraw's avatar

Tyler McGraw

Stories from the SOC Part 2: MSIX Installer Utilizes Telegram Bot to Execute IDAT Loader

Detection and Response

Stories from the SOC Part 2: MSIX Installer Utilizes Telegram Bot to Execute IDAT Loader

Tom Elkins's avatar

Tom Elkins

Stories from the SOC Part 1: IDAT Loader to BruteRatel

Products and Tools

Stories from the SOC Part 1: IDAT Loader to BruteRatel

Tom Elkins's avatar

Tom Elkins

How To Hunt For UEFI Malware Using Velociraptor

Vulnerabilities and Exploits

How To Hunt For UEFI Malware Using Velociraptor

Matthew Green's avatar

Matthew Green

Network Access for Sale: Protect Your Organization Against This Growing Threat

Vulnerabilities and Exploits

Network Access for Sale: Protect Your Organization Against This Growing Threat

Jeremy Makowski's avatar

Jeremy Makowski

Infostealer Malware Masquerades as Windows Application

Threat Research

Infostealer Malware Masquerades as Windows Application

Andrew Iwamaye's avatar

Andrew Iwamaye