Labs

The Mystery Of Metador 5

LABScon Replay | The Mystery of Metador

An elusive APT is attacking telcos, ISPs and Universities with custom backdoors and attack chains designed to bypass native security solutions.

Read More
MJ Emanuel 2

LABScon Replay | Demystifying Threats to Satellite Communications in Critical Infrastructure

Satellite communications are an integral part of many Industrial Control Systems, but their usage in critical infrastructure continues to be misunderstood.

Read More
Mauro 2

LABScon Replay | Are Digital Technologies Eroding the Principle of Distinction in War?

In recent conflicts, digital technology has become weaponized, eroding the traditional barriers that divide the roles of civilians and combatants.

Read More
SocGholish Diversifies And Expands Its Malware Staging Infrastructure To Counter Defenders 2

SocGholish Diversifies and Expands Its Malware Staging Infrastructure to Counter Defenders

SocGholish operators continue to infect websites at a massive scale, and the threat actor is ramping up its infrastructure to match.

Read More
Black Basta Feature

Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor

Black Basta operational TTPs are described here in full detail, revealing previously unknown tools and techniques and a link to FIN7.

Read More
WIP19 Espionage New Chinese APT Targets IT Service Providers And Telcos With Signed Malware By Joey Chen And Amitai Ben Shushan Ehrlich 12

WIP19 Espionage | New Chinese APT Targets IT Service Providers and Telcos With Signed Malware

Precision targeting of critical infrastructure industries indicates espionage-related activity by an unattributed Chinese-speaking threat group.

Read More
The Sprawling Infrastructure Of A Careless Mercenary 3

Void Balaur | The Sprawling Infrastructure of a Careless Mercenary

The Void Balaur cyber mercenary group has thrived throughout 2022, attacking targets on a global scale with new phishing campaigns.

Read More
The Mystery Of Metador An Unattributed Threat Hiding In Telcos ISPs And Universities 3

The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities

An elusive adversary is attacking high-value targets with impunity using novel malware frameworks and custom-built backdoors.

Read More
Intermittent Encryption For Speed And Evasion On The Rise A Trending Feature On The Ransomware Scene By Aleksandar Milenkoski Jim Walter 5

Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection

Partially encrypting victims' files improves ransomware speed and aids evasion. First seen in LockFile, the technique is now being widely adopted.

Read More
PyPI Phishing Campaign JuiceLedger Threat Actor Pivots From Fake Apps To Supply Chain Attacks 1

PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain Attacks

A new threat actor is spreading infostealer malware through targeted attacks on developers and fraudulent cryptotrading applications.

Read More