Labs

SNS Sender Active Campaigns Unleash Messaging Spam Through The Cloud 3

SNS Sender | Active Campaigns Unleash Messaging Spam Through the Cloud

Threat actors leverage cloud services to conduct massive smishing campaign through AWS Simple Notification Service.

Read More
Chinas Cyber Revenge Why The PNC Fails To Back Its Claims Of Western Espionage 4

China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage

China's claims of hacks and espionage lack the rigorous technical detail seen in western threat intel. Why the asymmetry, and how does it benefit the PRC?

Read More
A Glimpse Into Future ScarCruft Campaigns Attackers Gather Strategic Intelligence And Target Cybersecurity Professionals 20

ScarCruft | Attackers Gather Strategic Intelligence and Target Cybersecurity Professionals

New ScarCruft activity suggests the adversary is planning to target cybersecurity professionals and businesses.

Read More
Send Lawyers ‘Garchs And Money 5

LABScon Replay | Send Lawyers, ‘Garchs, and Money

From the Mueller report to the Steele Dossier, Liz Wharton explores the world of oligarch-funded lawyers and their attempts to discredit public research.

Read More
Exploring FBot Python Based Malware Targeting Cloud And Payment Services 6

Exploring FBot  | Python-Based Malware Targeting Cloud and Payment Services

FBot arms threat actors with a multi-function attack tool designed to hijack cloud, Saas and web services.

Read More
Spectre Strikes Again Introducing The Firmware Edition 1

LABScon Replay | Spectre Strikes Again: Introducing the Firmware Edition

Binarly's CEO Alex Matrosov dives deep into the fascinating world of speculative attacks against System Management Mode (SMM) on AMD-based devices.

Read More
Intellexa And Cytrox From Fixer Upper To Intel Agency Grade Spyware 1

LABSCon Replay | Intellexa and Cytrox: From Fixer-Upper to Intel Agency Grade Spyware

Vitor Ventura breaks down the processes one spyware organization takes to develop fully working spyware using a one-click zero-day exploit.

Read More
Gaza Cybergang Unified Front Targeting Hamas Opposition 13

Gaza Cybergang | Unified Front Targeting Hamas Opposition

Cluster of threat groups continues on trajectory to consolidate with shared victims, TTPs and evolving malware.

Read More
Sandman APT China Based Adversaries Embrace Lua 19

Sandman APT | China-Based Adversaries Embrace Lua

SentinelLabs, Microsoft, and PwC threat intelligence researchers provide attribution-relevant information on the Sandman APT cluster.

Read More
The Cyber Arm Of Chinas Soft Power Reshaping A Continent 2

LABScon Replay | The Cyber Arm of China’s Soft Power: Reshaping a Continent

Tom Hegel explores China's influence in Africa and highlights an opportunity for broader understanding of global cyber threat landscapes.

Read More