LABScon Replay | Does This Look Infected 2 (APT41)
Mandiant researchers Van Ta and Rufus Brown take us on a journey of discovery into the compromise of multiple U.S. Government networks by APT41.
Read More
Mandiant researchers Van Ta and Rufus Brown take us on a journey of discovery into the compromise of multiple U.S. Government networks by APT41.
Silas Cutler, founder of MalShare, explores some of the challenges and rewards of developing and maintaining a free malware repository for researchers.
Availability of leaked Babuk source code is fuelling a proliferation of file lockers targeting VMware ESXi.
DPRK-linked threat actor deploys previously unseen reconnaissance tool 'ReconShark' in wave of ongoing attacks.
SentinelLabs has been tracking a cluster of malicious documents that stage the Crimson RAT malware distributed by APT36 (Transparent Tribe).
A sophisticated new toolset is being used to harvest credentials from multiple cloud service providers, including AWS SES and Microsoft Office 365.
Mark Russinovich, founder of SysInternals, explores the history and development of one of the security industry's most essential toolkits.
Cyber espionage actor deploys custom credential theft malware in new campaign targeting the telecoms sector.
SentinelLabs uncover a previously unknown set of espionage campaigns conducted by Winter Vivern advanced persistent threat (APT) group.
New Linux version of the IceFire ransomware have been observed in recent network intrusions of media and entertainment enterprises.