Discord Invite Hijacking: How Fake Links Are Delivering Infostealers
The attackers employed a sophisticated combination of the ClickFix phishing technique, multi-stage...
Read MoreOperational Analysis of Ransomware Attack Lifecycle
Ransomware isn’t just about locking files—it’s a multi-stage, coordinated intrusion. It’s...
Read MoreLockBit Ransomware: From Cybercriminal Glory to a Critical OPSEC Failure
What Is lockbit ? LockBit is a family of ransomware that takes advantage of widely available...
Read MoreAkira Ransomware Road To Glory
Executive Summary First Identified:March 2023 Operation Style:is a ransomware variant and...
Read MoreDelivering Trojans Via ClickFix Captcha
Overview Recently, a new social engineering technique has emerged, rapidly gaining traction as a...
Read MoreBlackLock Ransomware: A Growing Threat Across Industries
BlackLock could become the most active RaaS group of 2025. The latest threat report from the...
Read MoreIdentity Reveal: The Threat Actor Behind ZATCASAUDI ARABIA Leaks
Identity Reveal: The Threat Actor Behind ZATCA SAUDI ARABIA Leaks On May 11, 2024, at 12:32...
Read MoreHelldown Ransomware Analysis
Introduction Helldown ransomware, first identified in August 2024, is a recent addition to the...
Read MoreFog Ransomware – Technical Analysis
what is Fog ? In June [Arctic Wolf Labs] reported a deployment of a new ransomware named Fog...
Read MoreSidewinder APT – Phishing on Pakistan
Introduction On July 30th, [StrikeReady Labs] reported the discovery of a malicious **LNK** file....
Read More