Introduction Primarily focused on financial gain since its appearance, BlueNoroff (aka. Sapphire Sleet, APT38,…
Tag:
Malware Descriptions
-
-
Introduction Back in 2024, we gave a brief description of a complex cyberespionage campaign…
-
Incident description The first version of the AdaptixC2 post-exploitation framework, which can be considered…
-
A malware campaign was recently detected in Brazil, distributing a malicious LNK file using…
-
Introduction Mysterious Elephant is a highly active advanced persistent threat (APT) group that we…
-
Introduction In this article, we explore how the Model Context Protocol (MCP) — the…
-
Background RevengeHotels, also known as TA558, is a threat group that has been active…
-
Introduction The modern development world is almost entirely dependent on third-party modules. While this…
Older Posts
