EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company
I'd like to thank my coauthors, Victor Vrabie, Adrian Schipor, and Martin Zugec, for their ...
Why Alert Volume Matters: Cutting Through the Noise
Making Sense of MITRE Evaluations The MITRE Engenuity ATT&CK Evaluations serve as a ...
ShrinkLocker (+Decryptor): From Friend to Foe, and Back Again
Imagine a ransomware attack that's so old-school it's using VBScript and a built-in Windows ...
5 Approaches to Counter a Cybercriminal’s Growing Arsenal
Cybercriminals are advancing at a relentless pace, arming themselves with adaptable tools ...
Meow, Meow Leaks, and the Chaos of Ransomware Attribution
Meow has captivated the attention of cybersecurity and threat intelligence teams as a threat ...
Understanding the Roles in the Ransomware-as-a-Service Ecosystem: Who’s Targeting Your Data Security Gaps
Ransomware-as-a-service (RaaS) has surged in recent years, becoming a dominant model for ...
The Importance of People in Cyber Risk Management: Incident Response Tabletop Exercises (TTX)
Imagine waking up to find your organization’s data plastered across the dark web. The ...
Top Ransomware Trends for 2024-2025 Security Teams Can't Ignore
As ransomware tactics evolve, staying ahead of emerging threats has never been more crucial ...
A Comprehensive Look at the Evolution of the Cybercriminal Underground
The early days of hacker groups and lone wolf threat actors look much different compared to ...
Beyond Technical Offensive Security: 4 Tips for Implementing a Holistic Approach to Managing Cyber Risk
Cybersecurity assessments are an integral part of an organization’s security strategy, ...
Our Software Release Strategy
Following recent cybersecurity events, we’ve seen a significant increase in inquiries from ...
Breaking Down the Intersection of AI and Cybersecurity
In the world of cybersecurity, staying ahead of emerging threats is paramount. Florin ...