phishing microsoft 365
The Phishing-as-a-Service platform targeting Microsoft 365 customers
Research & Threat Intel
A detailed walkthrough of how a phishing kit can be used to bypass MFA on Microsoft 365 accounts.
cyber-intrusion
Dark AI tools: How profitable are they in the...
Research & Threat Intel
KrakenLabs have observed key actors and groups the dark artificial intelligence ecosystem, exploring the business of selling and developing artificial...
mitre framework
Using Mitre Att&CK with threat intelligence to improve Vulnerability...
Research & Threat Intel
Threat actors are constantly evolving their tactics and techniques in the attack lifecycle and infiltrate company infrastructure. While most organizations...
cyber-intrusion
Minimizing intrusion detection time with cyber threat intelligence
Research & Threat Intel
In an era defined by pervasive connectivity, businesses of all sizes find themselves grappling with an escalating threat of cyber-attacks....
ICS attack classifications
ICS attack classifications: differentiating between cyberwarfare, cyberterrorism, and hacktivism
Research & Threat Intel
In this article, we build the bridge between the conceptual field of International Relations and the terminology employed by cybersecurity...