LABScon25 Replay | Auto-Poking The Bear: Analytical Tradecraft In The AI Age
AI agents promise speed, but at what cost to trust? Dreadnode’s Wendiggensen & Palm unpack this dilemma through a hands-on study of leaked Russian data.
AI agents promise speed, but at what cost to trust? Dreadnode’s Wendiggensen & Palm unpack this dilemma through a hands-on study of leaked Russian data.
LLM-enabled malware poses new challenges for detection. SentinelLABS presents groundbreaking research on how to hunt for this new class of threats.
DPRK-aligned threat actors abuse CTI platforms to detect infrastructure exposure and scout for new assets.
Crypto scammers use fake YouTube bots, AI videos, and obfuscated smart contracts to steal $900K+, targeting unwary traders.
PXA Stealer uses advanced evasion and Telegram C2 to steal global victim data, fueling a thriving cybercrime market.
China-linked hackers used patented spyware tech from front companies tied to Hafnium, exposing gaps in cyber threat attribution.
NimDoor shows how threat actors are continuing to explore cross-platform languages that introduce new levels of complexity for analysts.
This report uncovers a set of related threat clusters linked to PurpleHaze and ShadowPad operators targeting organizations, including cybersecurity vendors.
FreeDrain is a modern, scalable phishing operation exploiting weaknesses in free publishing platforms to steal cryptocurrency on a global scale.
This report highlights a rarely-discussed but crucially important attack surface: security vendors themselves
AkiraBot uses OpenAI to generate custom outreach messages to spam chat widgets and website contact forms at scale.