hacker image
TOP 5 ATT&CK techniques used by Threat Actors tied...
Research & Threat Intel
False flags and strong anonymity measures can be used to make attribution of cyberattacks more and more difficult.
servhelper ta505 map
TA505 evolves ServHelper, uses Predator The Thief and Team...
Research & Threat Intel
This blog post will offer some analysis on developments relating to ServHelper, including detail on relevant campaigns and those threat...
hacker image
Spanish consultancy Everis suffers BitPaymer ransomware attack: a brief...
Research & Threat Intel
On 4th November 2019 researchers and the media reported a massive ransomware attack against several Spanish companies. Some of this...
RESEARCH
An analysis of a spam distribution botnet: the inner...
Research & Threat Intel
Successful cybercrime campaigns make use of different elements working together to achieve their common goal. In the case of Onliner,...
real-time-threat-intelligence
Real-time threat detection and why timing is the key...
Research & Threat Intel
You wouldn’t sit idle under siege. However, when it comes to confronting real-time cyberthreats, it is what some businesses are...