Insight on Vulnerabilities in MOVEit Transfer
Ongoing developments on this topic will be added to this thread. We invite you to bookmark this page and check back. Read More HERE…
Ongoing developments on this topic will be added to this thread. We invite you to bookmark this page and check back. Read More HERE…
Ongoing developments on this topic will be added to this thread. We invite you to bookmark this page and check back. Read More HERE…
Discover how Companion can help upgrade SOC efficiency and elevate your team to reach their full potential. Read More HERE…
We looked into the documented behavior of SeroXen malware and noted the inclusion of the latest iteration of the batch obfuscation engine BatCloak to generate a fully undetectable (FUD) .bat loader. This is the second part of a three-part series documenting the abuse of BatCloak’s evasion capabilities and interoperability with other malware. Read More HERE…
Discover how Companion can help upgrade SOC efficiency and elevate your team to reach their full potential. Read More HERE…
This blog entry discusses the more technical details on the most recent tools, techniques, and procedures (TTPs) leveraged by the Earth Preta APT group, and tackles how we were able to correlate different indicators connected to this threat actor. Read More HERE…
Elevate cloud capabilities and stay ahead in today’s dynamic cloud landscape. Read More HERE…
We look into BatCloak engine, its modular integration into modern malware, proliferation mechanisms, and interoperability implications as malicious actors take advantage of its fully undetectable (FUD) capabilities. Read More HERE…
This blog talks about the latest TargetCompany ransomware variant, Xollam, and the new initial access technique it uses. We also investigate previous variants’ behaviors and the ransomware family’s extortion scheme. Read More HERE…
We have been able to uncover a massive cryptocurrency scam involving more than a thousand websites handled by different affiliates linked to a program called Impulse Project, run by a threat actor named Impulse Team. Read More HERE…