Introduction Stan Ghouls (also known as Bloody Wolf) is an cybercriminal group that has…
Targeted attacks
-
-
Over the past few years, we’ve been observing and monitoring the espionage activities of…
-
Mobile SecuritySecurity
Operation Triangulation: iOS devices targeted with previously unknown malware
UPD 23.04.2025: MITRE created a page for Operation Triangulation as part of its ATT&CK…
-
Introduction The Evasive Panda APT group (also known as Bronze Highland, Daggerfly, and StormBamboo)…
-
Known since 2014, the Cloud Atlas group targets countries in Eastern Europe and Central…
-
Introduction In March 2025, we discovered Operation ForumTroll, a series of sophisticated cyberattacks exploiting…
-
Post-exploitation frameworks Threat actors frequently employ post-exploitation frameworks in cyberattacks to maintain control over…
-
While tracking the activities of the Tomiris threat actor, we identified new malicious operations…
-
Just like the 2000s Flip phones grew popular, Windows XP debuted on personal computers,…
-
Introduction Primarily focused on financial gain since its appearance, BlueNoroff (aka. Sapphire Sleet, APT38,…
