88 88
88 88
88 88
8b d8 8b, ,d8 88 88 8b,dPPYba, ,adPPYb,88 ,adPPYba, 8b,dPPYba, ,adPPYb,d8 8b,dPPYba, ,adPPYba, 88 88 8b,dPPYba, ,adPPYb,88
`8b d8' `Y8, ,8P' aaaaaaaa 88 88 88P' `"8a a8" `Y88 a8P_____88 88P' "Y8 a8" `Y88 88P' "Y8 a8" "8a 88 88 88P' `"8a a8" `Y88
`8b d8' )888( """""""" 88 88 88 88 8b 88 8PP""""""" 88 8b 88 88 8b d8 88 88 88 88 8b 88
`8b,d8' ,d8" "8b, "8a, ,a88 88 88 "8a, ,d88 "8b, ,aa 88 "8a, ,d88 88 "8a, ,a8" "8a, ,a88 88 88 "8a, ,d88
"8" 8P' `Y8 `"YbbdP'Y8 88 88 `"8bbdP"Y8 `"Ybbd8"' 88 `"YbbdP"Y8 88 `"YbbdP"' `"YbbdP'Y8 88 88 `"8bbdP"Y8
aa, ,88
"Y8bbdP"
..........................'''''''''',,,,,,,,,;;;;;;;;;;;;;;::::::::::::cccccccccccccccccccllcclcccclllllccccccccccccccccccccccccccccccccccccccccccccccccccc:cccc:::::c:::::;;;;;;;;;;;;;,,,,,,,,,,,,''''
......................'..'''...''''',,,,,,,;;;;;;;;;;;;;;;;:::::::::::ccccccccccccccccllccccccllllllllllcccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc::::::;;;;;;;;;;;;;,,,,,,,,,,,''
......................''''''''''''',,,;,,;;;;;;;;:::::;;;::::::::::::cccccccccccccccccclcccllllllllllllllcccccllcccccccclclllllccccccccccllcclccccccccccccccccccccccccccc:::::::::::;;;;;;;;;;;,,,,,,,,'
........................'''''''''',,,,;;;;;;;;;;;::::::::::::::::::::ccccccccccclllllcclllllclllllllllllllllllllcccccclllllllllllcccccllcllcclcccccccccccccccccccccccccccccc:::::::::;;;;;;;;;;,,,,,,,,'
.........................''''''''',,,;;;;;;;;;;;::::;::::::c:::::::cccllcccllllllcclllllcllllllllllllllllllllllllllllllllllllllccccccccllllllllllcccccccccccccccccccccccccccc::::::::;;;;;;;;;;;;;,,,,,,
......................''''''''''',,,;;;;;;;;::::::::::::::cccc:ccccccccclccllllllllllllllcllllllllllllollllllllllllllllllllllllccccccclllllllllllllcccccccccclcccccccccccccccc::::::::::::;;;;;;;;;;,,,,
....................'''''''''',,,,,,;;;;;;;:;;:::::::::::cccccccccccccclccclllllllllllllllllcllllllloollllllllllllllllllllllllllllllllllllllllllllllllllllcclllccclllcclllcccccc::::::::::::;;;;;;;;;;,,
...................''''''''',,,,,,,;;;;;;;;;;;:::::::c:::::ccccccccccclllllllllllllllllllllllllllllllllllllllllllllollllllllllllllllllllllllllllllclllllccccllllccclllllcccllcccc::::::::::::::::;;;;;;;
................'''''''''''''',,,,;;;;;;;;;;;::::::ccc:::::cccccclccclllllllllllllllllllllllllllllllllllllllllllllllllllllollloolllllllllllllllllllllllllccclllllcclllllccccccccccccc::::::::::::;;;;;;;
..............'''''''''''''''',,,,;;;;;:;:::::::::::::::::ccccccclcccllcllllllllllllllllloollllllllllllooooolllllooloollllllllollllllooolllllllllllllllllllllllllcclccccccllcccccccccccc:::::::::::;;;;;
.............'''''''',,,,'',,,,,,,;;;;:::::::::::::::::::cccccccclllcccclllllllllllllllllllllllllloooooooooollllloooooolllllloooolllllooooollllllllllllllllllllllcclcccccccccccccccccccccc::::::::::;;;;
............'''''',,,,,,'',,,,,,,;;;;;;::::::::::::::::::::ccccccclllclllllllllllllloolllllllll::;;;,,,,,,,,,,;;;;:::::ccccllloooollllllloolllllllllllllllllllllllllllllcccccclccccccccccc::::::::::::;;
............''''',,,,,,,,,,,,,,,,;;;;;;;:::::::::::::::cccccccccccllllllllllllllllllllllllllc;'..........................'',,;;::cccllllloollllllllllllllllllllllllllllllccclllcccccccccccccc::::::::::;
............'''''',,,,,,,,,;;,,,;;;;;;;;::::::::::::::::::cccccccccclllllllllllllllllllllllc'. ...................''',;;;;;;:cccllllcccclllllllllllllllollllllllcccclllllccccccccccccccccc::::::
.............'''''',,,,,,,,,,,,,;;;;;;::::;;;;:::::::::ccccccccccccccccccccllllllllllllllll; .........','',;;::ccllcccccllllllllllllllloollllllcllcccllllllcccccccccc:ccccc:::::
...........''''''''''',,,,,,,,,,;;;;;;:::;;;;;;::::::::::ccccccccccccccccclllllllllllllllll:. . ..........................',,;:cloddddoolllllllllooollllllclllccllllllllccccccccccccc::::::
...........''''''''''''',,,,,,,,,,;;;;;;;;;;;;:::::::::::cccccccccccccccccclllllllllllllllll:. ........................',,,,;;,'.....',;clodxxdddooolllllllllllllcllcllllllllccccccccccccc::::::
...........''''..'''',,,'',,,,,,,,;;;;;;;;;;;;:::::::::::::cccc::::ccccccccllclllccccclllllll:. .....................',,,,,;;::ccccccc:;,''''',;:cclloddooollc::clccllllllllllllcccccccccccc::::::
..........'.......''',,,,,,,,,,,,,,,;;;;;;;;;;;;;;:::::::;:::::::::cccccccccccclllcccccclllllc' ......................'',;;;;;:cccllllloooolc:;;;,,,''',;:looddl;;:::cclllccccllllccccccc:cccc:::::
.........''.....'''''',,,,,,,,,,,,,,,,,;;;;;;;;;;;;;;;::;;::::::::::::cccccccccclcccccccclllll;. ......................''',,;:::ccccllooooooodddoolcc::;;,'.',:odl:;;;;;::ccccllccllcccclcccccccc::::
..........'........'''',,,''''',,,,,,,,,;;,;;;;;;;;;;;;::;:::;::::::::::c:ccccccccccccccccllcl:. .................''''',,;;::clllllooodddddddddddollccccc:;'',::,'.'''',;;;:clllcllcccccllccccccc:::
...................'''''''''''''''''',,',,,,,,,,,,,,;;;;;;;;;;;;;::::::::::cccccccccccccccllccc. ................'',,,;;;::cloloddddxxxkkkkkxxddoollccclll:;,,'........''',;:cllllcccccccccccccc:::
.....................'''''''''''''''''''''',,,,,,,,,,,;;,,;;;;;;;;::::::::ccccccccccccccccccclc. ................''',,;;::cclloodxxkkkkOOOOkkkxddooolclllll:;'.............'';clllllcccccccccccc:::
.............'''......''.............''''''''',,,,,,,,,,,,,,,,;;;;;;;;;;::::cccccccccccccccccc:. ......'',,''''''''',,,;::ccllooddxxkkOOOkkkkkxxxddoooooodo:,.................;llllllccccccccccc:::
,:;'''....':looooolc;;,'...............'''''.'''''''''',,,,,,,,,;;;;;;;;;::::c::::::cccccccccc,. ......''''''''...'',,;;:ccloodddxxkkkkkkkkkkxxxxxxxxxxxxdl,'................':llcllllcclcllccccccc
col,,:'. ;dkdl:cdxdodkxlclc;,'..................''''''''''''',',,,,,,,;;;;;:::::::::::::cccc:'.. .........'..''...'''',,;:clldxkkkkO000000OOOkkxxxxxxxxkkkd:'.........'.....';clllllllllllllllcccccc
ldd:.;:.. :xocodxkkodkxdkKK0Ol.............................''.........''''',,,,;;;;;;;::::::;........................'''',;;:clodxOOOO00KKKXXKKKKK0Okkxxxxxkxl,...........'..',:llllllllolllllllccccccc
;ldl.':,. ;dlcdxdodllkOko:;;;'............................... ..........''''........................''',,;:clodxkOOOO0KKXXXXXXXXXXXK00Oxdooo:,'''..'.....'',:cllllllllloolllcllccccccc
.,llc,',..;ooclddllo;.','..................................... .........''''''''......'.''',,;cldxkO0000KKXXXXNNXXXXXXKK0kdoollc:,'.''.....',:lllllllllllllllccclccccccc
.:lo:.::,clcoxl;'............................................. .......''',,,,,'''',,;:cloodxkO0KKXXXXXXXKKKK0xoooollo:..''..'.',cloollllllllloollccccccccccc
.;llc',cc:ldc;'................................................... ......'',,;;;::;;;:ccloodxkO0000K0Oxddooclo:.....'..,cllooollllollllolllcclccccccc
' .:loc.,oc;,.......................................................... .....',,;:::cc::::ccclodooooolldl'....''',:llllloolllllllloollllcccccccc
;..cdo:.':'................................................................. ....',;:cccc:::;;;,;ll,....'',,;clllolllllllllllooolcccccccccc
' .:dkd,.c:........................................................................ ...,;;:cccc::,'''.'',,:lllollllllllllllloollcclcccccc
;..,oxxl,;:.............................................................................. ........... ...',,;;;;;;;:cllllllllllllllllllllllcclccccc
;'..;col;'.............................................................................. .....',,,,,''''.... ...',;:coooolllllllllllllloolcccccccc
....,coc'.............................................................................. ..... .........';:clllccccc,'c:. ...';;:cllllllllllcllllccccccc
....,coo;............................................................................. .... ..:;',;clllooddxxdc;:;;. .... ...';:clllcclllccccccc
....':odc......................................... ...................................''.. .... .;olokkkxdxxkkkOd:ldc,. .. ......... ...,;:cllllccccc
.....,cdd;........................................ .............................':::;'',,'.. ... 'dxdOkkkkOOOOOOOdlc;...'...''...... ... .. ..,;cccccc
......:ldl'... . ............................... .. ........................';;lxxd::cooc'. .'. .,odoxkkO000000K0Oxc...,'..,,''''........ ...... ..,:cc
......,cod:. . ... ............................ ....................':ccc;;:lxxxxkOkd;. ... .,cllxk0KKKKKKKKKOd'..,;. ';;,,,,,...''. ..''...... ,cc
.......;ldo'.. ... .................. ...... .................';;cdxxocloddoodddxdl'. .... ..';;:cdk0KKKKKKKK0x,..;;,..,:;;;,,'.',,,...',,'.....'''....... ..':cc
.. ..,codc. . ... . ...... ............;cllc;,;looooooollccccccc:'. .............'',;coxO00KKKKXKk,..;;;' .;;;;;,'..,;;...',;;,'''.,lollollccc::;;;,,,'''',,,,,,,,,;:ccc:c
. .';ldo,. .. . . ... ........';:::lddollllcccccccc:::;;;;;;;'.. ............';codxkO0KKKKk;..,;;;..';;;;;,..,;;'..',;;;,,'',clllllolllllllllclcccccclllllcccccccccc
..,coxc. .. ....... .... ........ .....,colc,';cllcccc:::::::cc:::;,,'''',,'..............';:cldxkO00KKk;..,,;:;..,;;,,,..,,;,'.'',;;,,,,,cllllllllllllllllllcccccccllcccccccccccc
..;ldo,. .......... . ....,;;;:lolcclocc:::;;;;:::::::::;;;,,'''',,;;;;,,,,,;,,;:cllodxkkO0KO;..,,',;,',;;,,,..,,;;,''',,;,,,,;:llllllllolllllllclllcccccccccccccccccccc
..,codl. ...... ...,;::;,,;cllc::::;;;;;;;;::::::::::::;;;;,,,,,;;;;;;;;::cccllodddxkO00O:..,;,.',,,;;,,,'.,,,,,,,,,,,;,,,,:lllllcllllllollllclcccccccccccccccccccccc
..;ldd;. .... ...',;;;:cccloolc:;;;,,,,,,;;;;;::::::::::::;;;;;;,,,,,,,;;::cccoodxxxxO00Oc..';;'..',;,,,,..',,,,,,,,,,,,,,,;clllllllllllllllllllcccccccccccccccccccccc
.':oxl. . . ... . ..,::;,',;::::::;;,,,'',,,,,;;;:::::::::cc::::::::;;;;;,,,;;;;;;:ccodxxxkO00l..';;,'..',,,','..,,,'''''''...,,,:llccllllllllloooolllcccccccc:ccc:ccc::cccc
.,cdx:. .. ..',,,;::::::;;,,,,'''''',,;;;:::cc;,;ccccc;,;cc:cc;;::::::ccc:::::cldxxkkO0K0o..';;,'..'',,'''..'','..'''......';clllllllllllllooooolllllccccc:cccccc:::::::
.':lxo. . ....''',;;;;,,,,''',;;;;;;::;;:;:ccc:,';:ccc:,',:ccc:,';clllol::cldxkOkk00KKKKOc..',,;,'..'','''..',,''','.. .....;cllllllllllllllloollllcccccc::cccc::::::::
..,cdd:. ...'''...','''',,,;;;::::c::c::;;:::ccllllllooooooooddoooolccccc::cclxOKxlk00KKOo,..',,,,''..'''''..',,'',,'. .....:lllllllllllllllllllllcccccc::ccccc:::::::
.':oxo' .',''''..'',,;:c::cccccc;,::;cc:::::::::;,,,,,,,,,,;:cllooodxxxxxxxddddddoclx0KKo..',,,,,,,'...''...'''',,,'..... ...:llcclclllllclllllllllccc:ccc:::::::::::::
..,cdxc. . ....'..',,;:llol;;ll:::;;,,,,'''..... ......',,;;:clloolcc:::;;...'...''''........''',,,,'''....... ...;clccclllllllccclcccccccccccccc::::::::::::
..;lxo' ......',:c;,:::ccc:;,,''...... ..... .......... ............ ..................'',,,''',,,'''.......;llllllllllccccccclcclcccccccc:cc:::::;;::::
.,codc. ......',;clc,,::;,,'..... ......................... ..........'..''....',,''''''''':lllllcccclllcclllllclllccccc::::::::::::::::
..;ldd, ........',,:;;,'........ ................................ ........',,''',,,,,,,,;;,,,;::ccllcccllolllllllccclllcccc::::::::::::::;
.,codc. ..'.......''''..... ........................................ .. ... .......'''',,,,,,,,;;;;;;;;:::ccllllllllllllcccllllcccc::ccc:::::::::
..;lod; .'',,............ ................................'',,'. .. . .................''',,,;;:cclccllcccllllllllllccc::::::cc:::;;::
.':ldl. .';'','........ .... .........................'''',,,'... .... ... ...... . ..........',;:ccllcccccccllcllcccc:::::::::::::::
..;cdd;. ..';,..... ........................'''''',,,,,,,' ................. .......',:ccccccccccccccccc:::::::::::::;;;
.':ldl. ..... ....................'''''''''',,,,,,,,. .. ... .....................................',;ccccccccccccccc::::::::::::;;;;
..;cod:. ...................''''''',,,,,,'''.. ... ..........'....',,''''.'''''...........,;ccccc:::cccc:::::::;;;;;;;;;;
.':ldo' . ....................''........ . ......... ..............';;,,,,',,,,,,,,,''''''''';:ccc:::::cc::::::;;;;;;;;;;;
.;codc. ....................... .. ........................',,,,'.........'......''''''';::::::::::::::::;;;;;;;;;;;
.';cdo' ............... ... .....................''...................''''''...',,;:::::::::::;;;;;;;;;;;
.':ldc. ..... .. ........''''''''''''''''',,,,,,,'''''''''..'''''.''',,;;:::::;;;;;;;;;;;;
..;coo' .... ... ............'''''''''''''''',,,,''''''''''.'''''',,;;:;;;;;;;;;;;,
.':loc. . ..'. ... ................'',,,,,,,'''''''''''''''''.''',,,;;;;;;;;;,
..,clo, ............ .''..... ....... ...........................'',,,,,,,,,,,,''''''''''''''''''''''',,,,;;;,,,
.';coc. ................ ..'.. .....................'..........''''..'''''',,,,,,,,,,,,''''''''''',,,'''''''''''''''',,,,,,
..':ll,. ................ ...,'. .................'''''''''''''''''''''',,,,,,,,,,,,''''''''''',,,,,,,,,''''''''''''''''''
..,clc. ......................... ..............'''''''''',,,',,,,,,,,,,;;;;;,,,,'''''..''',,,,,,,,,,,,,,,''''''''''''''
.';cl,. ..................... .. ................'''''''',,,,,,,,,,,,,,,,,,,,,''''...',,,;;,,,,,,,,,,,,,,,,,,'''''''''
..':lc. ........................ ..................''''',,,,,,,,,,,,,,,,,,,'''....',,;;,,,,,,,;;,,,,,,,,,,,,,,,''''''
..;cl;. .......................... ................'''',,,,,,,,,,,,,,,,,''.....'',;;,,,,''',,,,,,,,,,,,,,,,,,,,'''''
.';lc. .......................... .. ................'''',,,,,,,,,,,,,,,'''....',,,,,,,,'''''',,,,,,,,,,,,,,,,,,,,,''.
..,cl;. ............................ .. ................'',,,,,,,,,,,,,,,,''......',,;;,,''''..''''',,,,,,,,,,,,,,,,,,'''.
.';cc. ............................. ........ ...........''',,,,,,,,,,,,,,,'......'',,,,,,''''....''''',''',''',,,'',,,'''..
.,:c;. ................................. ........ ............'''''''''''',''''.....''',,,,,,,''......'''''''''''''','''''''''..
..;cc' ........................................... ............''''''''','',,''....''',,,,,,,,''.......'''''''''''''''''''''.....
.';c;. .................................................. .......'''''',''''''....'',,,,,,,,,''.........'..''''''''.'''''''......
..,::' ................................................... .........''''''''''.....'',,,,,,,,''..................'''...''''.......
.';:;. ..............................................................'''''''''....'',,,,,,,,''..........................''........
..';:' .......................................... ....................''''''''''''',,,,,,,,,'.....................................
..,:;. ...............................................................''',,'''''',,,,,,,,,,''.................................. ..
..';:' .......................................... ......................''',''''''',,'''',,,''.....................................
2025-03-12 - Medusa Ransomware
2025-03-13 - ArechClient; Decoding IOCs and finding the onboard browser extension
2025-03-13 - Botnets never die
2025-03-13 - New Ransomware Operator Exploits Fortinet Vulnerability Duo
2025-03-14 - Lumma Stealer – A tale that starts with a fake Captcha
2025-03-24 - Weaver Ant, the Web Shell Whisperer - Tracking a Live China-nexus Operation
2025-03-25 - IBM X-Force discovers new Sheriff Backdoor used to target Ukraine
2025-03-23 - Analyzing Vidar Stealer/Paper/2025-03-23 - Analyzing Vidar Stealer
2025-03-25 - Inside DollyWay’s C2 Infrastructure - Traffic Direction Systems and the LosPollos Connection
2025-03-22 - Back to Business- Lumma Stealer Returns with Stealthier Methods
2025-03-18 - Code-signing certificate abuse in the Black Basta chat leaks (and how to fight back)
2025-03-20 - Operation FishMedley
2025-03-17 - DollyWay World Domination- Eight Years of Evolving Website Malware Campaigns
2025-03-20 - Reversing FUD AMOS Stealer
2025-03-14 - SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware
2025-03-20 - UAT-5918 targets critical infrastructure entities in Taiwan
2025-03-15 - Understanding SalatStealer- Features and Impact
2025-03-17 - Black Basta’s blunder - exploiting the gang’s leaked chats
2025-03-14 - Android Banking Trojan – OctoV2, masquerading as Deepseek AI
2025-03-18 - Operation AkaiRyū- MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor
2025-03-16 - Bybit – What We Know So Far
2025-03-13 - Inside BRUTED- Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge Network Devices
2025-03-13 - Decrypting Encrypted files from Akira Ransomware (Linux-ESXI variant 2024) using a bunch of GPUs
2025-03-13 - Tracking Ransomware - February 2025
2025-03-13 - Work Hard, Pay Harder!
2025-03-16 - Analyzing the RedTiger Malware Stealer
InTheWild Collection/Release File Listings/InTheWild.0215.7z.txt
InTheWild Collection/Release File Listings/InTheWild.0214.7z.txt
InTheWild Collection/Downloadable Releases/InTheWild.0213.7z
InTheWild Collection/Downloadable Releases/InTheWild.0214.7z
InTheWild Collection/Release File Listings/InTheWild.0213.7z.txt
2025-03-25 - On the Hunt for Ghost(Socks)
2025-03-25 - Inside Kimsuky’s Latest Cyberattack - Analyzing Malicious Scripts and Payloads
2025-03-25 - Phishing Campaign Targets Defense and Aerospace Firms Linked to Ukraine Conflict
2025-03-26 - CoffeeLoader - A Brew of Stealthy Techniques
2025-03-26 - Lynx Ransomware - Learn details about the operation and how to mitigate this threat
2025-03-25 - Tempted to Classifying APT Actors- Practical Challenges of Attribution in the Case of Lazarus’s Subgroup
2025-03-25 - Operation ForumTroll - APT attack with Google Chrome zero-day exploit chain
2025-09-29 - Cybercrime Observations from the Frontlines UNC6040 Proactive Hardening Recommendations
2025-03-26 - The Long and Short(cut) of It - KoiLoader Analysis
2025-03-27 - A Phishing Tale of DoH and DNS MX Abuse
2025-03-28 - A Deep Dive into Water Gamayun’s Arsenal and Infrastructure
2025-03-28 - Exposing Crocodilus - New Device Takeover Malware Targeting Android Devices
2025-03-28 - Hidden Malware Strikes Again - Mu-Plugins Under Attack
2025-03-28 - TsarBot - A New Android Banking Trojan Targeting Over 750 Banking, Finance, and Cryptocurrency Applications
2025-03-31 - Analyzing New HijackLoader Evasion Tactics
2025-03-31 - CPU_HU - Fileless cryptominer targeting exposed PostgreSQL with over 1.5K victims
2025-03-31 - DarkCloud Stealer
2025-03-31 - From Contagious to ClickFake Interview - Lazarus leveraging the ClickFix tactic
2025-03-31 - Gootloader Returns - Malware Hidden in Google Ads for Legal Documents
2025-03-31 - Malware hiding in plain sight - Spying on North Korean Hackers
2025-03-31 - Operation HollowQuill - Malware delivered into Russian R&D Networks via Research Decoy PDFs
2025-03-31 - The Espionage Toolkit of Earth Alux - A Closer Look at its Advanced Techniques
2025-04-01 - Auto-color - Linux backdoor
2025-04-01 - Salvador Stealer - New Android Malware That Phishes Banking Details & OTPs
2025-04-01 - Same Russian-Speaking Threat Actor, New Tactics Abuse of Cloudflare Services for Phishing and Telegram to Filter Victim IPs
2025-04-02 - An in-depth look at Black Basta's TTPs
2025-04-02 - BeaverTail and Tropidoor Malware Distributed via Recruitment Emails
2025-04-02 - Tracking Adversaries - EvilCorp, the RansomHub affiliate
2025-04-03 - Threat actors leverage tax season to deploy tax-themed phishing campaigns
2025-04-03 - UAC-0219 Attack Detection - A New Cyber-Espionage Campaign Using a PowerShell Stealer WRECKSTEEL
2025-04-04 - Lazarus Expands Malicious npm Campaign - 11 New Packages Add Malware Loaders and Bitbucket Payloads
2025-04-04 - OPSEC Failure Exposes Coquettte's Malware Campaigns on Bulletproof Hosting Servers
2025-04-07 - UAC-0226 Attack Detection - New Cyber-Espionage Campaign Targeting Ukrainian Innovation Hubs and Government Entities with GIFTEDCROOK Stealer
2025-04-08 - Exploitation of CLFS zero-day leads to ransomware activity
2025-04-08 - Goodbye HTA, Hello MSI- New TTPs and Clusters of an APT driven by Multi-Platform Attacks
2025-04-08 - Inside DanaBot’s Infrastructure - In Support of Operation Endgame II
2025-04-08 - State-Sponsored Tactics - How Gamaredon and ShadowPad Operate and Rotate Their Infrastructure
2025-04-10 - GOFFEE continues to attack organizations in Russia
2025-04-10 - Newly Registered Domains Distributing SpyNote Malware
2025-04-11 - Flesh Stealer - A Report on Multivector Data Theft
2025-04-11 - Interview with the Chollima
2025-04-11 - Threat Spotlight - Hijacked and Hidden - New Backdoor and Persistence Technique
2025-04-14 - BPFDoor’s Hidden Controller Used Against Asia, Middle East Targets
2025-04-14 - New Malware Variant Identified - ResolverRAT Enters the Maze
2025-04-14 - Proton66 Part 1 - Mass Scanning and Exploit Campaigns
2025-04-14 - Slow Pisces Targets Developers With Coding Challenges and Introduces New Customized Python Malware
2025-04-15 - CyberSOC Insights - Analysis of a Black Basta Attack Campaign
2025-04-15 - Hunting Mice In Tunnels II - Fake CAPTCHAs and Ransomware
2025-04-15 - Renewed APT29 Phishing Campaign Against European Diplomats
2025-04-15 - UNC5174’s evolution in China’s ongoing cyber warfare- From SNOWLIGHT to VShell
2025-04-16 - Inside Gamaredon’s PteroLNK - Dead Drop Resolvers and evasive Infrastructure
2025-04-16 - Interlock ransomware evolving under the radar
2025-04-17 - Around the World in 90 Days - State-Sponsored Actors Try ClickFix
2025-04-17 - Breaking the B0 ransomware - Investigation & Decryption
2025-04-17 - IronHusky updates the forgotten MysterySnail RAT to target Russia and Mongolia
2025-04-17 - Mitigating ELUSIVE COMET Zoom remote control attacks
2025-04-17 - Proton66 Part 2 - Compromised WordPress Pages and Malware Campaigns
2025-04-17 - Unmasking the new XorDDoS controller and infrastructure
2025-04-21 - Unmasking the Evolving Threat - A Deep Dive into the Latest Version of Lumma InfoStealer with Code Flow Obfuscation
2025-04-22 - Distribution of PebbleDash Malware in March 2025
2025-04-22 - Infostealer Malware FormBook Spread via Phishing Campaign – Part I
2025-04-22 - Phishing for Codes - Russian Threat Actors Target Microsoft 365 OAuth Workflows
2025-04-22 - Russian organizations targeted by backdoor masquerading as secure networking software updates
2025-04-23 - AsyncRAT Malware Analysis
2025-04-23 - Introducing ToyMaker, an initial access broker working in cahoots with double extortion gangs
2025-04-23 - Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations
2025-04-23 - Understanding the threat landscape for Kubernetes and containerized assets
2025-04-24 - Contagious Interview (DPRK) Launches a New Campaign Creating Three Front Companies to Deliver a Trio of Malware - BeaverTail, InvisibleFerret, and OtterCookie
2025-04-24 - Crypters And Tools. Part 2- Different Paws — Same Tangle
2025-04-24 - Understanding Alcatraz ~ Obfuscator Analysis [EN]
2025-04-25 - Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors
2025-04-25 - Rolling in the Deep(Web) - Lazarus Tsunami
2025-04-25 - The Persistent Threat of Salt Typhoon - Tracking Exposures of Potentially Targeted Devices
2025-04-28 - Top Tier Target - What It Takes to Defend a Cybersecurity Company from Today’s Adversaries
2025-04-28 - Uncovering Actor TTP Patterns and the Role of DNS in Investment Scams
2025-04-29 - Gremlin Stealer - New Stealer on Sale in Underground Forum
2025-09-02 - Obscura an Obscure New Ransomware Variant
2025-09-03 - Analyzing NotDoor Inside APT28’s Expanding Arsenal
2025-09-03 - DragonForce Ransomware
2025-09-03 - FANCY BEAR GONEPOSTAL – Espionage Tool Provides Backdoor Access to Microsoft Outlook
2025-09-04 - Bells Ringing in Dar es Salaam
2025-09-04 - New Botnet Emerges from the Shadows NightshadeC2
2025-09-04 - North Korean Threat Actors Reveal Plans and Ops by Abusing Cyber Intel Platforms
2025-09-05 - Unmasked Salat Stealer – A Deep Dive into Its Advanced Persistence Mechanisms and C2 Infrastructure
2025-09-06 - Unknown Malware Using Azure Functions as C2
2025-09-07 - APT37 Targets Windows with Rust Backdoor and Python
2025-09-07 - ValleyRAT Exploiting BYOVD to Kill Endpoint Security
2025-09-08 - Blurring the Lines Intrusion Shows Connection With Three Major Ransomware Gangs
2025-09-08 - CyberVolk Ransomware Analysis of Double Encryption Structure and Disguised Decryption Logic
2025-09-21 - Block Blasters - Forensic Report
2025-09-29 - Cybercrime Observations from the Frontlines UNC6040 Proactive Hardening Recommendations
2025-04-29 - Nitrogen Dropping Cobalt Strike – A Combination of “Chemical Elements”
2025-04-29 - Russia – Assignment of cyber attacks against France to the Russian military intelligence service (APT28) (29 April 2025)
2025-04-29 - Uncovering MintsLoader With Recorded Future Malware Intelligence Hunting
2025-04-29 - Yet Another NodeJS Backdoor (YaNB)- A Modern Challenge
2025-04-30 - Advisory - Pahalgam Attack themed decoys used by APT36 to target the Indian Government
2025-04-30 - Finding Malware - Unveiling LUMMAC.V2 with Google Security Operations
2025-05-01 - Deep Dive Fog ransomware
2025-05-01 - FortiGuard Incident Response Team Detects Intrusion into Middle East Critical National Infrastructure
2025-05-01 - I StealC You - Tracking the Rapid Changes To StealC
2025-05-01 - TerraStealerV2 and TerraLogger - Golden Chickens' New Malware Families Discovered
2025-05-02 - Prelude - Crypto Heist Causes HAVOC
2025-05-02 - Venom Spider Uses Server-Side Polymorphism to Weave a Web Around Victims
2025-05-05 - Negotiations with the Akira ransomware group - an ill-advised approach
2025-10-07 - 0-day vulnerability exploited by Cl0p patched by Oracle
2025-10-06 - Massive Malicious NPM Package Attack Threatens Software Supply Chains.
2025-10-08 - Oracle E-Business Suite Zero-Day Exploited in Widespread Extortion Campaign
2025-10-07 - Phishing from Home The Hidden Danger in Remote Jobs Lurking in Tesla Google Ferrari and Glassdoor
2025-10-09 - AdaptixC2 Uncovered Capabilities Tactics Hunting Strategies
2025-10-09 - Inside a Crypto Scam Nexus
2025-10-09 - Inside Akira’s SonicWall Campaign Darktrace’s Detection and Response