
ScarCruft | Attackers Gather Strategic Intelligence and Target Cybersecurity Professionals
New ScarCruft activity suggests the adversary is planning to target cybersecurity professionals and businesses.
Read More
New ScarCruft activity suggests the adversary is planning to target cybersecurity professionals and businesses.
From the Mueller report to the Steele Dossier, Liz Wharton explores the world of oligarch-funded lawyers and their attempts to discredit public research.
FBot arms threat actors with a multi-function attack tool designed to hijack cloud, Saas and web services.
Binarly's CEO Alex Matrosov dives deep into the fascinating world of speculative attacks against System Management Mode (SMM) on AMD-based devices.
Vitor Ventura breaks down the processes one spyware organization takes to develop fully working spyware using a one-click zero-day exploit.
Cluster of threat groups continues on trajectory to consolidate with shared victims, TTPs and evolving malware.
SentinelLABS, Microsoft, and PwC threat intelligence researchers provide attribution-relevant information on the Sandman APT cluster.
Tom Hegel explores China's influence in Africa and highlights an opportunity for broader understanding of global cyber threat landscapes.
Explore how revisiting past cyber incidents can empower defenders and help to anticipate future threats more effectively.
Exploring the technical intricacies of Appin, a hack-for-hire group, revealing confirmed attribution and global threat activity, both old and new.