PhishingSecurity How we linked ForumTroll APT to Dante spyware by Memento Labs by admin October 27, 2025 by admin October 27, 2025 In March 2025, Kaspersky detected a wave of infections that occurred when users clicked… 0 FacebookTwitterPinterestEmail
PhishingSecurity The BetterBank DeFi protocol exploited for reward minting by admin October 22, 2025 by admin October 22, 2025 Executive summary From August 26 to 27, 2025, BetterBank, a decentralized finance (DeFi) protocol… 0 FacebookTwitterPinterestEmail
PhishingSecurity Notable email phishing techniques in 2025 by admin October 21, 2025 by admin October 21, 2025 Introduction Cyberthreats are constantly evolving, and email phishing is no exception. Threat actors keep… 0 FacebookTwitterPinterestEmail
PhishingSecurity Cyberespionage campaign PassiveNeuron targets machines running Windows Server by admin October 21, 2025 by admin October 21, 2025 Introduction Back in 2024, we gave a brief description of a complex cyberespionage campaign… 0 FacebookTwitterPinterestEmail
PhishingSecurity Malicious package with AdaptixC2 framework agent found in npm registry by admin October 17, 2025 by admin October 17, 2025 Incident description The first version of the AdaptixC2 post-exploitation framework, which can be considered… 0 FacebookTwitterPinterestEmail
PhishingSecurity Hidden links: why your website traffic is declining by admin October 17, 2025 by admin October 17, 2025 When analyzing the content of websites in an attempt to determine what category it… 0 FacebookTwitterPinterestEmail
PhishingSecurity Maverick: a new banking trojan abusing WhatsApp in a massive scale distribution by admin October 15, 2025 by admin October 15, 2025 A malware campaign was recently detected in Brazil, distributing a malicious LNK file using… 0 FacebookTwitterPinterestEmail
PhishingSecurity Mysterious Elephant APT: TTPs and tools by admin October 15, 2025 by admin October 15, 2025 Introduction Mysterious Elephant is a highly active advanced persistent threat (APT) group that we… 0 FacebookTwitterPinterestEmail
PhishingSecurity Hacktivism in 2025: what it looks like and how hashtags help analyze it by admin October 14, 2025 by admin October 14, 2025 What do hacktivist campaigns look like in 2025? To answer this question, we analyzed… 0 FacebookTwitterPinterestEmail
PhishingSecurity Neil Lawrence: What makes us unique in the age of AI by admin October 7, 2025 by admin October 7, 2025 As AI advances at a rapid clip, reshaping industries, automating tasks, and redefining what… 0 FacebookTwitterPinterestEmail