Kymberlee Ftr

LABScon24 Replay | Let Them Eat Cake: “Secure by Upgrade” Software is a National Security Threat

Kymberlee Price reveals the technical chaos facing SMBs as they struggle with solutions aimed at bigger fish in the face of expanding crimeware.

Read More
Op Digital Eye Ftr

Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels

Aleksandar Milenkoski & Luigi Martire (Tinexta Cyber) /

Threat actors abused Visual Studio Code and Microsoft Azure infrastructure to target large business-to-business IT service providers in Southern Europe.

Read More
Pkfail Ftr

LABScon24 Replay | PKfail: Supply-Chain Failures in Secure Boot Key Management

Binarly’s Alex Matrosov and Fabio Pagani present PKfail, a firmware supply-chain security issue affecting major device vendors and hundreds of device models.

Read More
Cristina Ftr

LABScon24 Replay | A 30-Year Journey from Compilation Student to Decompilation Pioneer

Dr. Cristina Cifuentes, known as the Mother of Decompilation, reflects on three decades of innovation in reverse engineering in her LABScon 2024 keynote.

Read More
Cybervolk V2 Ftr

CyberVolk | A Deep Dive into the Hacktivists, Tools and Ransomware Fueling Pro-Russian Cyber Attacks

A loose collective of mostly low-skilled actors, CyberVolk absorbs and adapts a wide array of destructive malware for use against political targets.

Read More
DPRK Front V3 Ftr

DPRK IT Workers | A Network of Active Front Companies and Their Links to China

SentinelLabs has identified multiple deceptive websites linked to businesses in China fronting for North Korea's fake IT workers scheme.

Read More
BNThief Feature

BlueNoroff Hidden Risk | Threat Actor Targets Macs with Fake Crypto News and Novel Persistence

SentinelLabs has observed a suspected DPRK threat actor targeting Crypto-related businesses with novel multi-stage malware.

Read More
Cloud Workshop Blue Ftr

Cloud Malware | A Threat Hunter’s Guide to Analysis, Techniques and Delivery

Learn about cloud threats, how to hunt for them and how to analyze them in this post based on Alex Delamotte's recent LABScon workshop.

Read More
China Influence Feature

China’s Influence Ops | Twisting Tales of Volt Typhoon at Home and Abroad

China's CVERC attempts to attribute Volt Typhoon activities to the U.S., but the fact-free claims reveal much about the PRC's real agenda.

Read More
Kryptina Desert Ftr

Kryptina RaaS | From Unsellable Cast-Off to Enterprise Ransomware

Kryptina's adoption by Mallox affiliates complicates malware tracking as ransomware operators blend different codebases into new variants.

Read More