This blog has been written by our Senior Security Researcher, S. Nayani Introduction Understanding how real attackers develop methods for bypassing security controls and reverse engineering […]
You may have heard of a SOC, and you may have heard of an XDR, these security solutions and services are critical to an organization’s cybersecurity. […]
Introduction Remcos is an extensive and powerful Remote Administration Tool, first discovered listed for sale in underground forums in the latter half of 2016. Since its […]
What’s Happening? Tensions between the Ukrainian and Russian governments were running high at the beginning of 2022. And now, in a span of two months, Russia […]
Introduction Lokibot first emerged as an information stealer and keylogger in hacker forums back in 2015. Since then, it has added many capabilities and features over […]
Organizations no longer rely on traditional cybersecurity threat intelligence to secure information in today’s highly dynamic and ever-changing threat landscape. Modern attackers are sophisticated, well-funded, and […]
In 2021, cybercriminals launched a series of attacks that were not only well-coordinated but also far more sophisticated than any previous attacks. Cybersecurity threats are becoming […]