cyber-intrusion
Dark AI tools: How profitable are they on the...
Research & Threat Intel
KrakenLabs have observed key actors and groups the dark artificial intelligence ecosystem, exploring the business of selling and developing artificial...
cyber-intrusion
Minimizing intrusion detection time with cyber threat intelligence
Research & Threat Intel
In an era defined by pervasive connectivity, businesses of all sizes find themselves grappling with an escalating threat of cyber-attacks....
ICS attack classifications
ICS attack classifications: differentiating between cyberwarfare, cyberterrorism, and hacktivism
Research & Threat Intel
In this article, we build the bridge between the conceptual field of International Relations and the terminology employed by cybersecurity...
KrakenLabs’ threat actor naming conventions
Research & Threat Intel
KrakenLabs has developed a new naming convention that uses poisonous plants to represent the origin and criminal activities of threat...
LummaC2 stealer: Everything you need to know
Research & Threat Intel
In this blog post, the KrakenLabs team will take a deep dive into a malware sample classified as LummaC2, an...