

Investigating BlackSuit Ransomware’s Similarities to Royal
In this blog entry, we analyse BlackSuit ransomware and how it compares to Royal Ransomware.
Two vulnerabilities in PaperCut have been found, and one of them is being actively exploited in the wild. This blog entry provides a summary of the vulnerabilities, and includes security guidance for IT and SOC professionals.
In this blog entry, we analyse BlackSuit ransomware and how it compares to Royal Ransomware.
Void Rabisu, a malicious actor believed to be associated with the RomCom backdoor, was thought to be driven by financial gain because of its ransomware attacks. But in this blog entry, we discuss how the use of the RomCom backdoor in recent attacks shows how Void Rabisu's motives seem to have changed since at least October 2022.
This is an analysis of Bandit Stealer, a new Go-based information-stealing malware capable of evading detection as it targets multiple browsers and cryptocurrency wallets.
This blog explains the new resources of health industry cybersecurity practises and landscape analysis which the HHS (U.S. Department of Health and Human Services) released in Apr 2023.
This blog entry features three case studies that show how malicious actors evade the antispam, antibot, and antiabuse measures of online web services via residential proxies and CAPTCHA-breaking services.
Learn how connected car cyber risk will evolve in the coming years.
In this blog entry, we will examine the security risks related to file extension-related Top-Level Domains (TLDs) while also providing best practises and recommendations on how both individual users and organisations can protect themselves from these hazards.
In this entry, we detail our research findings on how an info stealer is able to achieve persistence on a victim’s machine by modifying the victim’s Discord client.
In this blog post, we will provide details on a BlackCat ransomware incident that occurred in February 2023, where we observed a new capability, mainly used for the defence evasion phase.
This is the first part of our security analysis of an information stealer targeting GitHub Codespaces (CS) that discusses how attackers can abuse these cloud services for a variety of malicious activities.