Preview image for a blog post

DPRK's Digital Deception: North Korean Hackers Weaponize Phony Job Interviews Against Software Developers

North Korean threat actors exploit fake job interviews to compromise software developers, leveraging sophisticated social engineering tactics.
Preview image for a blog post

UAT-9921 Emerges: Unpacking the VoidLink Framework and Its Advanced Threat Landscape

Cisco Talos uncovers UAT-9921, a sophisticated threat actor leveraging the VoidLink framework in campaigns since 2019, posing a severe cybersecurity risk.
Preview image for a blog post

Notepad++ Supply Chain Attack: Unpacking State-Sponsored Tactics & Patch Tuesday's Forecast

Analyzing the sophisticated Notepad++ supply chain attack, the utility of global threat intelligence, and the critical forecast for upcoming Patch Tuesday vulnerabilities.
Preview image for a blog post

Beyond the Bait: Decrypting Threat Actor Tactics in the Digital Ocean

Explore advanced OSINT, digital forensics, and threat intelligence, leveraging fishing analogies for cybersecurity insights.
Preview image for a blog post

RedKitten Unleashed: Unmasking Iran's Cyber Campaign Against Human Rights Defenders

HarfangLab uncovers RedKitten, an Iran-aligned cyber campaign targeting human rights NGOs and activists amidst 2025-2026 Iranian unrest.
Preview image for a blog post

Locked In: Navigating the Cyber Abyss – Hazel's Deep Dive into Threat Intelligence

Hazel explores staying informed amidst cyber threats, delivering crucial updates on ransomware, APTs, and OSINT for defense.