How Shortcut Files (.LNK) used to Deliver Ransomware
Windows Shortcut files — commonly known as LNK files — are a core part of the Windows...
Read MoreInfo Stealers 101: Everything You Should Know
In today’s rapidly evolving cyber threat landscape, information stealers — or...
Read MoreClickFix Chaos: A Deep Dive into Rhadamanthys Infostealer’s Stealth and Steal Tactics
While hunting for phishing domains, I came across this suspicious...
Read MoreDiscord Invite Hijacking: How Fake Links Are Delivering Infostealers
The attackers employed a sophisticated combination of the ClickFix phishing technique, multi-stage...
Read MoreAkira Ransomware Road To Glory
Executive Summary First Identified:March 2023 Operation Style:is a ransomware variant and...
Read MoreDelivering Trojans Via ClickFix Captcha
Overview Recently, a new social engineering technique has emerged, rapidly gaining traction as a...
Read MoreBlackLock Ransomware: A Growing Threat Across Industries
BlackLock could become the most active RaaS group of 2025. The latest threat report from the...
Read MoreHelldown Ransomware Analysis
Introduction Helldown ransomware, first identified in August 2024, is a recent addition to the...
Read MoreFog Ransomware – Technical Analysis
what is Fog ? In June [Arctic Wolf Labs] reported a deployment of a new ransomware named Fog...
Read MoreSidewinder APT – Phishing on Pakistan
Introduction On July 30th, [StrikeReady Labs] reported the discovery of a malicious **LNK** file....
Read More