Unmasking Shadows: How a Cybercriminal Accidentally Revealed His Identity
In a fascinating turn of events, a threat actor known by the online moniker ‘La_Citrix’ inadvertently exposed their real identity by infecting their own computer with an information stealer. This…
Tools – Cyberchef v10 released
GCHQ, the UK's intelligence, security, and cyber agency, has just announced the release of CyberChef v10. This latest version of the "Cyber Swiss Army Knife" introduces a host of new…
FIN8 Cybercrime Group
In the ever-evolving landscape of cyber threats, the financially motivated cybercrime group known as FIN8 continues to make waves. Known for their sporadic yet impactful attacks, FIN8 has been active…
Exploring TA453’s Foray into LNKs and Mac Malware – Proofpoint Report
"Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware" published by Proofpoint discusses the evolving tactics of TA453, also known as Charming Kitten, APT42, Mint Sandstorm, and…
Inside Job: IT Security Analyst Convicted for Exploiting Ransomware Attack on Oxford Biomedica
Ashley Liles, a 28-year-old former IT security analyst from Letchworth Garden City in Hertfordshire, has been convicted of blackmail and unauthorized access to a computer with intent to commit other…
Unmasking AVrecon: The Stealthy Malware Infiltrating Global Routers – Lumen Report
Lumen Technologies, formerly known as CenturyLink, is a global technology company that provides a wide range of services, including communications, network services, security, cloud solutions, voice, and managed services. The…
Overcoming the Top Ten Challenges in Open Source Intelligence (OSINT): A Comprehensive Introduction
Open Source Intelligence (OSINT) has become an indispensable tool in the digital age, providing a wealth of information from publicly available sources. It is used extensively in various fields, from…
JumpCloud Security Breach
JumpCloud, a US-based enterprise software firm known for its cloud directory platform, recently disclosed a security breach that was part of a highly targeted operation aimed at a select group…
TeamTNT’s Cloud Credential Stealing Campaign
In the ever-evolving landscape of cybersecurity, threat actors continue to innovate and adapt their methods to exploit new technologies and platforms. One such group, known as TeamTNT, has been actively…
In-Depth Analysis of Storm-0558 Techniques for Unauthorized Email Access
This blog post is based on the detailed analysis provided by Microsoft Security Blog on the techniques used by the threat actor tracked as Storm-0558 for unauthorized email access. Executive…
