In August 2025, we discovered a campaign targeting individuals in Turkey with a new…
Phishing
-
-
Introduction A typical phishing attack involves a user clicking a fraudulent link and entering…
-
We all encounter IoT and home automation in some form or another, from smart…
-
Post-exploitation frameworks Threat actors frequently employ post-exploitation frameworks in cyberattacks to maintain control over…
-
On December 4, 2025, researchers published details on the critical vulnerability CVE-2025-55182, which received…
-
Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them…
-
Telegram has won over users worldwide, and cybercriminals are no exception. While the average…
-
In September, a new breed of malware distributed via compromised Node Package Manager (npm)…
-
In the third quarter, attackers continued to exploit security flaws in WinRAR, while the…
-
While tracking the activities of the Tomiris threat actor, we identified new malicious operations…
