Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Insights on the MOVEit File Transfer Vulnerability
Exploits & Vulnerabilities

Insights on the MOVEit File Transfer Vulnerability

Ongoing developments on this topic will be added to this thread. We invite you to bookmark this page and check back.

June 16, 2023
Malware

SeroXen Mechanisms: Exploring Distribution, Risks, and Impact

This is the third installment of a three-part technical analysis of the fully undetectable (FUD) obfuscation engine BatCloak and SeroXen malware. In this entry, we document the techniques used to spread and abuse SeroXen, as well as the security risks, impact, implications of, and insights into highly evasive FUD batch obfuscators.

Jun 20, 2023

Save to Folio

Jun 20, 2023

Save to Folio

Exploits & Vulnerabilities

Insights on the MOVEit File Transfer Vulnerability

Ongoing developments on this topic will be added to this thread. We invite you to bookmark this page and check back.

Latest News Jun 16, 2023

Save to Folio

Latest News Jun 16, 2023

Save to Folio

Malware

SeroXen Incorporates Latest BatCloak Engine Iteration

We looked into the documented behavior of SeroXen malware and noted the inclusion of the latest iteration of the batch obfuscation engine BatCloak to generate a fully undetectable (FUD) .bat loader. This is the second part of a three-part series documenting the abuse of BatCloak’s evasion capabilities and interoperability with other malware.

Jun 15, 2023

Save to Folio

Jun 15, 2023

Save to Folio

Exploits & Vulnerabilities

To Fight Cyber Extortion and Ransomware, Shift Left

How can organizations defend themselves more effectively against ransomware and other forms of cyber extortion? By “shifting left” and adopting proactive cybersecurity strategies to detect attacks sooner, mitigating breaches before they cause harm.

Security Strategies Jun 15, 2023

Save to Folio

Security Strategies Jun 15, 2023

Save to Folio

Cyber Threats

Attack Surface Management Strategies

As organizations shift to the cloud in droves, their digital attack surface continues to rapidly expand. We explore how proactive cyber risk management can help harden your defenses and reduce the likelihood of an attack or breach.

Security Strategies Jun 15, 2023

Save to Folio

Security Strategies Jun 15, 2023

Save to Folio

APT & Targeted Attacks

Behind the Scenes: Unveiling the Hidden Workings of Earth Preta

This blog entry discusses the more technical details on the most recent tools, techniques, and procedures (TTPs) leveraged by the Earth Preta APT group, and tackles how we were able to correlate different indicators connected to this threat actor.

Research Jun 14, 2023

Save to Folio

Research Jun 14, 2023

Save to Folio

Malware

Analyzing the FUD Malware Obfuscation Engine BatCloak

We look into BatCloak engine, its modular integration into modern malware, proliferation mechanisms, and interoperability implications as malicious actors take advantage of its fully undetectable (FUD) capabilities.

Jun 09, 2023

Save to Folio

Jun 09, 2023

Save to Folio