cyber-intrusion
Minimizing intrusion detection time with cyber threat intelligence
Research & Threat Intel
In an era defined by pervasive connectivity, businesses of all sizes find themselves grappling with an escalating threat of cyber-attacks....
ICS attack classifications
ICS attack classifications: differentiating between cyberwarfare, cyberterrorism, and hacktivism
Research & Threat Intel
In this article, we build the bridge between the conceptual field of International Relations and the terminology employed by cybersecurity...
KrakenLabs’ threat actor naming conventions
Research & Threat Intel
KrakenLabs has developed a new naming convention that uses poisonous plants to represent the origin and criminal activities of threat...
LummaC2 stealer: Everything you need to know
Research & Threat Intel
In this blog post, the KrakenLabs team will take a deep dive into a malware sample classified as LummaC2, an...
Traffers and the growing threat against credentials
Research & Threat Intel
The Rising Threat of Traffers report, compiled by Outpost24’s Threat Intelligence team, KrakenLabs, provides a deep dive into the credential...