Send Lawyers ‘Garchs And Money 5

LABScon Replay | Send Lawyers, ‘Garchs, and Money

From the Mueller report to the Steele Dossier, Liz Wharton explores the world of oligarch-funded lawyers and their attempts to discredit public research.

Read More
Exploring FBot Python Based Malware Targeting Cloud And Payment Services 6

Exploring FBot  | Python-Based Malware Targeting Cloud and Payment Services

FBot arms threat actors with a multi-function attack tool designed to hijack cloud, Saas and web services.

Read More
Spectre Strikes Again Introducing The Firmware Edition 1

LABScon Replay | Spectre Strikes Again: Introducing the Firmware Edition

Binarly's CEO Alex Matrosov dives deep into the fascinating world of speculative attacks against System Management Mode (SMM) on AMD-based devices.

Read More
Intellexa And Cytrox From Fixer Upper To Intel Agency Grade Spyware 1

LABSCon Replay | Intellexa and Cytrox: From Fixer-Upper to Intel Agency Grade Spyware

Vitor Ventura breaks down the processes one spyware organization takes to develop fully working spyware using a one-click zero-day exploit.

Read More
Gaza Cybergang Unified Front Targeting Hamas Opposition 13

Gaza Cybergang | Unified Front Targeting Hamas Opposition

Cluster of threat groups continues on trajectory to consolidate with shared victims, TTPs and evolving malware.

Read More
Sandman APT China Based Adversaries Embrace Lua 19

Sandman APT | China-Based Adversaries Embrace Lua

SentinelLabs, Microsoft, and PwC threat intelligence researchers provide attribution-relevant information on the Sandman APT cluster.

Read More
The Cyber Arm Of Chinas Soft Power Reshaping A Continent 2

LABScon Replay | The Cyber Arm of China’s Soft Power: Reshaping a Continent

Tom Hegel explores China's influence in Africa and highlights an opportunity for broader understanding of global cyber threat landscapes.

Read More
Decoding The Past Securing The Future Enhancing Cyber Defense With Historical Threat Intelligence 13

Decoding the Past, Securing the Future | Enhancing Cyber Defense with Historical Threat Intelligence 

Explore how revisiting past cyber incidents can empower defenders and help to anticipate future threats more effectively.

Read More
Elephant Hunting Inside An Indian Hack For Hire Group 9

Elephant Hunting | Inside an Indian Hack-For-Hire Group

Exploring the technical intricacies of Appin, a hack-for-hire group, revealing confirmed attribution and global threat activity, both old and new.

Read More
Predator AI ChatGPT Powered Infostealer Takes Aim At Cloud Platforms 3

Predator AI | ChatGPT-Powered Infostealer Takes Aim at Cloud Platforms

An emerging infostealer being sold on Telegram looks to harness generative AI to streamline cyber attacks on cloud services.

Read More