Breaking Down the SEO Poisoning Attack | How Attackers Are Hijacking Search Results From the Front Lines | 6 minute read Read More >
Gotta Catch ‘Em All | Understanding the NetSupport RAT Campaigns Hiding Behind Pokemon Lures From the Front Lines | 7 minute read Read More >
Venus Ransomware | Zeoticus Spin-off Shows Sophistication Isn’t Necessary for Success From the Front Lines | 12 minute read Read More >
Ransoms Without Ransomware, Data Corruption and Other New Tactics in Cyber Extortion From the Front Lines | 8 minute read Read More >
8220 Gang Cloud Botnet Targets Misconfigured Cloud Workloads From the Front Lines | 6 minute read Read More >
Lazarus ‘Operation In(ter)ception’ Targets macOS Users Dreaming of Jobs in Crypto From the Front Lines | 5 minute read Read More >
From the Front Lines | Slam! Anatomy of a Publicly-Available Ransomware Builder From the Front Lines | 11 minute read Read More >
BlueSky Ransomware | AD Lateral Movement, Evasion and Fast Encryption Put Threat on the Radar From the Front Lines | 8 minute read Read More >
Living Off Windows Defender | LockBit Ransomware Sideloads Cobalt Strike Through Microsoft Security Tool From the Front Lines | 5 minute read Read More >
From the Front Lines | 8220 Gang Massively Expands Cloud Botnet to 30,000 Infected Hosts From the Front Lines | 14 minute read Read More >