Our Blog

Read our latest blog posts

Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 1)

A new malware, dubbed “Blister,” by the Elastic Security team that identified it, is leveraging valid code-signing...

Continue reading

Technical Analysis of Khonsari Ransomware Campaign Exploiting the Log4Shell Vulnerability

The Log4J vulnerability, which is being actively exploited in the wild, has led to a significant spike...

Continue reading

Emotet 2.0: Everything you need to know about the new Variant...

Since it was first identified in 2014, the Emotet banking trojan has been a persistent threat that...

Continue reading

Cryptocurrency: An Emerging Target for Cyberattacks

Based on a study by CloudSEK researchers, cryptocurrency related cyber attacks accounted for 2.9% of all reported...

Continue reading

Resurgence of DJVU/STOP Ransomware Strain in the Wild (Part 2/2)

We continue to track the behaviour of the DJVU/STOP ransomware in this 2nd part of the 2...

Continue reading

Resurgence of DJVU/STOP Ransomware Strain in the Wild (Part 1/2)

We delve into the modus operandi of the DJVU/STOP ransomware, its technicalities and features, how it identifies...

Continue reading

Advanced Automated Social Engineering Bots: The High Tide of Social Engineering...

This article provides an overview of SMS Ranger and how OTP bots are exploited by threat actors.

Continue reading

The Shang-Chi Malware Campaign: Is your pirated copy of the summer...

A recent campaign is spreading malware embedded in pirated copies of popular summer blockbusters like Shang-Chi and...

Continue reading

How Does k3d Knock Other Kubernetes Clusters Off Their Pedestals?

Learn more about the simple yet sophisticated k3d cluster that enhances the effectiveness of Kubernetes, the de...

Continue reading

The Unabated Reign of ATM Hacking: The 2021 Rajasthan ATM Attack...

Here are the specifics of the numerous physical and electronic attack vectors used by ATM hackers, highlighting...

Continue reading