ICS attack classifications
ICS attack classifications: differentiating between cyberwarfare, cyberterrorism, and hacktivism
Research & Threat Intel
In this article, we build the bridge between the conceptual field of International Relations and the terminology employed by cybersecurity...
KrakenLabs’ threat actor naming conventions
Research & Threat Intel
KrakenLabs has developed a new naming convention that uses poisonous plants to represent the origin and criminal activities of threat...
LummaC2 stealer: Everything you need to know
Research & Threat Intel
In this blog post, the KrakenLabs team will take a deep dive into a malware sample classified as LummaC2, an...
Traffers and the growing threat against credentials
Research & Threat Intel
The Rising Threat of Traffers report, compiled by Outpost24’s Threat Intelligence team, KrakenLabs, provides a deep dive into the credential...
Responsible disclosure: access control vulnerability discovered in the ThingsBoard...
Research & Threat Intel
On December 2022, a security researcher from the Outpost24 Ghost Labs team discovered a vulnerability on the ThingsBoard IoT platform,...