PhishingSecurity How to detect Mythic activity with NDR-class solutions by admin December 11, 2025 by admin December 11, 2025 Post-exploitation frameworks Threat actors frequently employ post-exploitation frameworks in cyberattacks to maintain control over… 0 FacebookTwitterPinterestEmail
PhishingSecurity New Tomiris tools and techniques: multiple reverse shells, Havoc, AdaptixC2 by admin November 28, 2025 by admin November 28, 2025 While tracking the activities of the Tomiris threat actor, we identified new malicious operations… 0 FacebookTwitterPinterestEmail
PhishingSecurity How NTLM is being abused in 2025 cyberattacks by admin November 26, 2025 by admin November 26, 2025 Just like the 2000s Flip phones grew popular, Windows XP debuted on personal computers,… 0 FacebookTwitterPinterestEmail
PhishingSecurity BlueNoroff’s latest campaigns: GhostCall and GhostHire by admin October 28, 2025 by admin October 28, 2025 Introduction Primarily focused on financial gain since its appearance, BlueNoroff (aka. Sapphire Sleet, APT38,… 0 FacebookTwitterPinterestEmail
PhishingSecurity How we linked ForumTroll APT to Dante spyware by Memento Labs by admin October 27, 2025 by admin October 27, 2025 In March 2025, Kaspersky detected a wave of infections that occurred when users clicked… 0 FacebookTwitterPinterestEmail
PhishingSecurity Mysterious Elephant APT: TTPs and tools by admin October 15, 2025 by admin October 15, 2025 Introduction Mysterious Elephant is a highly active advanced persistent threat (APT) group that we… 0 FacebookTwitterPinterestEmail
PhishingSecurity Analyzing the TTPs of hacktivists and APTs targeting Russian organizations by admin October 7, 2025 by admin October 7, 2025 Hacktivism and geopolitically motivated APT groups have become a significant threat to many regions… 0 FacebookTwitterPinterestEmail
PhishingSecurity A new RevengeHotels campaign targets Latin America by admin October 7, 2025 by admin October 7, 2025 Background RevengeHotels, also known as TA558, is a threat group that has been active… 0 FacebookTwitterPinterestEmail
PhishingSecurity Social engineering aspect of the XZ incident by admin April 27, 2024 by admin April 27, 2024 High-end APT groups perform highly interesting social engineering campaigns in order to penetrate well-protected… 0 FacebookTwitterPinterestEmail