In December 2025, we detected a wave of malicious emails designed to look like…
Targeted attacks
-
-
PhishingSecurity
Stan Ghouls attacks in Russia and Uzbekistan: NetSupport RAT and potential IoT interest
Introduction Stan Ghouls (also known as Bloody Wolf) is an cybercriminal group that has…
-
Over the past few years, we’ve been observing and monitoring the espionage activities of…
-
Mobile SecuritySecurity
Operation Triangulation: iOS devices targeted with previously unknown malware
UPD 23.04.2025: MITRE created a page for Operation Triangulation as part of its ATT&CK…
-
Introduction The Evasive Panda APT group (also known as Bronze Highland, Daggerfly, and StormBamboo)…
-
Known since 2014, the Cloud Atlas group targets countries in Eastern Europe and Central…
-
Introduction In March 2025, we discovered Operation ForumTroll, a series of sophisticated cyberattacks exploiting…
-
Post-exploitation frameworks Threat actors frequently employ post-exploitation frameworks in cyberattacks to maintain control over…
-
While tracking the activities of the Tomiris threat actor, we identified new malicious operations…
-
Just like the 2000s Flip phones grew popular, Windows XP debuted on personal computers,…
