Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
 Europol, Microsoft, TrendAI™ and Collaborators Halt Tycoon 2FA Operations
Cyber Threats

Europol, Microsoft, TrendAI™ and Collaborators Halt Tycoon 2FA Operations

Tycoon 2FA was dismantled this week by law enforcement and industry partners including TrendAI™. The phishing-as-a-service platform offered MFA bypass services using adversary-in-the-middle (AitM) proxying.

04/03/2026
Malware

Through the Lens of MDR: Analysis of KongTuke’s ClickFix Abuse of Compromised WordPress Sites

Our analysis of an active KongTuke campaign deploying modeloRAT — malware capable of reconnaissance, command execution, and persistent access — through compromised WordPress sites and fake CAPTCHA lures shows that the group still operates this delivery chain in parallel with the newer CrashFix technique.

Research 10/03/2026

Save to Folio

Research 10/03/2026

Save to Folio

Artificial Intelligence (AI)

CISOs in a Pinch: A Security Analysis of OpenClaw

Learn about OpenClaw (a sovereign agent) and how this can be viable for enterprises.

Expert Perspective 10/03/2026

Save to Folio

Expert Perspective 10/03/2026

Save to Folio

Artificial Intelligence (AI)

TrendAI™ at [un]prompted 2026: From KYC Exploits to Agentic Defense

At [un]prompted 2026, TrendAI™ demonstrated how documents can be used to exploit AI-driven KYC pipelines and introduced FENRIR, an automated system for discovering AI vulnerabilities at scale.

Latest News 09/03/2026

Save to Folio

Latest News 09/03/2026

Save to Folio

Malware

New BoryptGrab Stealer Targets Windows Users via Deceptive GitHub Pages

The BoryptGrab campaign uses fake SEO‑optimized GitHub repositories and deceptive download pages to distribute a data‑stealing malware family that delivers multiple payloads, including a reverse SSH backdoor, to Windows users.

Research 05/03/2026

Save to Folio

Research 05/03/2026

Save to Folio

Compliance & Risks

U.S. Public Sector Under Siege

Discover why Government and Education must prioritize Cyber Risk Management.

Expert Perspective 06/02/2026

Save to Folio

Expert Perspective 06/02/2026

Save to Folio