Preview image for a blog post

Operation ROBLOX: Dissecting the Breach of 610,000 Accounts and Threat Actor Attribution

Analysis of the Roblox account breach, malware distribution, and threat actor arrests. Focus on OSINT and digital forensics.
Preview image for a blog post

Storm Infostealer: The Server-Side Decryption Paradigm Shift in Credential Theft

Storm Infostealer introduces server-side decryption, fundamentally altering credential theft and complicating incident response and forensic analysis.
Preview image for a blog post

Unmasking Hidden Threats: Transparent COM Instrumentation for Advanced Malware Analysis with DispatchLogger

Explore DispatchLogger, Cisco Talos's open-source tool, offering deep visibility into late-bound IDispatch COM object interactions for advanced malware analysis.
Preview image for a blog post

Dark Reading Confidential: Unmasking an African Cybercrime Syndicate with Elite Threat Hunting

Will Thomas's team and Interpol busted a sprawling African cybercrime ring, recovering $3M, arresting 574, and decrypting 6 malware variants.
Preview image for a blog post

Remcos RAT's Evolution: Unveiling Enhanced Real-Time Surveillance and Evasion Techniques

New Remcos RAT variant expands real-time surveillance, advanced evasion, and sophisticated Windows compromise capabilities.
Preview image for a blog post

World Leaks Ransomware Group Unleashes RustyRocket: A New Era of Stealthy Extortion

Accenture warns: World Leaks ransomware group deploys 'RustyRocket', a custom, stealthy malware for sophisticated extortion campaigns.