Labs

Decoding The Past Securing The Future Enhancing Cyber Defense With Historical Threat Intelligence 13

Decoding the Past, Securing the Future | Enhancing Cyber Defense with Historical Threat Intelligence 

Explore how revisiting past cyber incidents can empower defenders and help to anticipate future threats more effectively.

Read More
Elephant Hunting Inside An Indian Hack For Hire Group 9

Elephant Hunting | Inside an Indian Hack-For-Hire Group

Exploring the technical intricacies of Appin, a hack-for-hire group, revealing confirmed attribution and global threat activity, both old and new.

Read More
Predator AI ChatGPT Powered Infostealer Takes Aim At Cloud Platforms 3

Predator AI | ChatGPT-Powered Infostealer Takes Aim at Cloud Platforms

An emerging infostealer being sold on Telegram looks to harness generative AI to streamline cyber attacks on cloud services.

Read More
Arid Viper APTs Nest Of SpyC23 Malware Continues To Target Android Devices 1

Arid Viper | APT’s Nest of SpyC23 Malware Continues to Target Android Devices

Hamas-aligned threat actor delivers spyware through weaponized apps posing as Telegram or Skipped messenger.

Read More
11 Ways To Tweak Radare2 For Faster And Easier MacOS Malware Analysis 3

11 Ways to Tweak radare2 for Faster and Easier macOS Malware Analysis

Simplifying radare2 for macOS malware research, these tips and tricks will help to improve workflow and supercharge productivity.

Read More
The Israel Hamas War Cyber Domain State Sponsored Activity Of Interest 6

The Israel-Hamas War | Cyber Domain State-Sponsored Activity of Interest

Cyber warfare occurring amidst the Israel-Hamas war underscores the importance of keeping tabs on rising APTs and opportunistic hacktivists.

Read More
Sandman APT A Mystery Group Targeting Telcos With A LuaJIT Toolkit 4

Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit

Sophisticated threat actor deploys high-end malware utilizing the LuaJIT platform to backdoor telcos in Europe, Middle East and South Asia.

Read More
Cyber Soft Power Chinas Continental Takeover 14

Cyber Soft Power | China’s Continental Takeover

China-aligned threat actors are increasingly involved in strategic intrusions in Africa, aiming to extend the PRC's influence across the continent.

Read More
CapraTube Transparent Tribes CapraRAT Mimics YouTube To Hijack Android Phones 3

CapraTube | Transparent Tribe’s CapraRAT Mimics YouTube to Hijack Android Phones

Pakistan-aligned threat actor weaponizes fake YouTube apps on the Android platform to deliver mobile remote access trojan spyware.

Read More
Bloated Binaries How To Detect And Analyze Multi Megabyte MacOS Malware 8

Bloated Binaries | How to Detect and Analyze Large macOS Malware Files

Massive malware binaries are becoming more common on macOS and can cause problems for detection and analysis. Here's how we can successfully deal with them.

Read More