threat intelligence Leveraging Threat Intelligence in Security Operations Explore the essential role of Cyber Threat Intelligence (CTI) in understanding and mitigating cybersecurity threats - detailing its types, processes, and effective implementation in enhancing security operations and incident response.
threat intelligence Cronus: Ransomware Threatening Bodily Harm This technical research analyzes Cronus Ransomware. We examine how the ransomware encrypts files, establishes persistence, and deviates from other ransom notes.
threat intelligence CrowdStrike BSOD Outage: What We Know What we know about the CrowdStrike BSOD outage.
threat intelligence Phishing Kits 101 & V3B Phishing Kit Phishing kits are "as-a-service" tools that help threat actors rapidly deploy phishing pages and campaigns. This blog examines key components, how they work, helpful resources, and a dive into the V3B phishing kit.
malware Latrodectus Loader This research examines the distribution mechanisms, C2 traffic patterns, and functionality of Latrodectus loader.
threat intelligence Tool Guide: CyberChef 101 Learn how to use the versatile, open source utility CyberChef. This 101 includes an overview, operations, real-world walkthrough, and resources.
threat intelligence Balada Injector Dive into how Balada exploits vulnerabilities within WordPress plugins. This research blog analyzes how Balada injects malicious code and the functionality of the scripts used in the campaign.
threat intelligence PikaBot Rising Dive into the distribution methods and capabilities of Pikabot, a loader that has been growing in prevalence since early 2023.
pulsedive 2023 In Review Here's our 2023 roundup of cyber threat intelligence news: key exploited vulnerabilities, ransomware, and Pulsedive updates over the last year.
threat intelligence Analyzing DarkGate Loaders This blog examines three different loader types used in recent DarkGate infections.
threat intelligence Analyzing Agniane Stealer Agniane is an emerging infostealer identified in August 2023. Dive into how Agniane collects data, evades analysis, and expands operations in this blog.
malware Identifying Mystic Stealer Control Panels Learn how to research and identify control panels for Mystic Stealer, an information stealer that appeared on underground markets in April 2023.
malware Akira Ransomware Akira is an emergent ransomware group that has been active since April 2023, targeting small to medium organizations. Here's what you need to know.