Technical Analysis of Emerging, Sophisticated Pandora Ransomware Group
2021 saw an outbreak of ransomware groups and attacks that affected every major industry across the globe....
2021 saw an outbreak of ransomware groups and attacks that affected every major industry across the globe....
Adversaries have been abusing Macros ever since the advent of the internet. This blog shows how threat...
Technical analysis of destructive malware, dubbed “Hermetic Wiper,“ targeting Ukrainian computers and websites. The malware then renders...
The blister is a code-signed malware that drops a malicious DLL file on the victim’s system, which...
A new malware, dubbed “Blister,” by the Elastic Security team that identified it, is leveraging valid code-signing...
The Log4J vulnerability, which is being actively exploited in the wild, has led to a significant spike...
Since it was first identified in 2014, the Emotet banking trojan has been a persistent threat that...
We continue to track the behaviour of the DJVU/STOP ransomware in this 2nd part of the 2...
We delve into the modus operandi of the DJVU/STOP ransomware, its technicalities and features, how it identifies...
A recent campaign is spreading malware embedded in pirated copies of popular summer blockbusters like Shang-Chi and...