Log in

Whoops! You have to login to access the Reading Center functionalities!

Forgot password?

Search the site...

Research & Threat Intelligence

Overview of the Russian-speaking infostealer ecosystem: the logs

This blog post aims at presenting the life cycle of logs, the cybercrime marketplaces dedicated to logs and the noticeable schemes recently used by threat actors to exploit the stolen data.

Read it later Remove

What's next

APT28 leverages multiple phishing techniques to target Ukrainian civil society

The APT28 intrusion set (aka. Sofacy, PawnStorm, Fancy Bear), associated to the Russian GRU was observed using multiple phishing...

Bluenoroff’s RustBucket campaign

In April 2023, fellow security researchers at Jamf published a report on Bluenoroff’s RustBucket, a newly observed malware targeting...

Iran Cyber Threat Overview

This blogpost aims at understanding and contextualising cyber malicious activities associated with Iran-nexus intrusions sets over the 2022-2023 period.

Comments are closed.