Latest in Insights

Leadership Perspectives

Financial Safety 101 for Gen Z: Build It Before You Need It

From budgeting to scams to identity theft, here’s how Gen Z can build a financial foundation that actually holds up online

Alisha Robinson's photo
Alisha Robinson

April 17, 2026 • 7 min read

Research

Chasing an Angry Spark

A VM-obfuscated backdoor observed on a single machine in the UK, operated for one year, and vanished without a trace.

Threat Research Team's photo
Threat Research Team

April 14, 2026 • 29 min read

Research

Building a last-resort unpacker with AI

Exploring how AI can assist in unpacking protected binaries, recovering payloads from unsupported packers, while reducing repetitive analysis

David Álvarez's photo
+1
David Álvarez & 1 others

April 13, 20268 min read

Research

Remus: Unmasking The 64-bit Variant of the Infamous Lumma Stealer

The Lumma Rebrand We’ve Been Waiting For?

Vojtěch Krejsa's photo
+1
Vojtěch Krejsa & 1 others

April 7, 202634 min read

Research

Why Join the Navy if You Can Be a Pirate?

Though you might sometimes become cargo. Inside the macOS Cracked Software Pipeline

Adolf Středa's photo
+1
Adolf Středa & 1 others

March 31, 202612 min read

Research

From Celebrity Deepfakes to Avatar Farms, How Scammers Industrialize Trust

When the face is familiar but the person isn’t real

Luis Corrons's photo
+2
Luis Corrons & 2 others

March 26, 202610 min read

Research

The Reservation Hijack Scam: How attackers hijack hotel accounts to target guests

From Booking-themed lures to compromised hospitality software, criminals are using reservation data and trusted workflows to make fraud feel like customer service.

Martin Chlumecký's photo
+1
Martin Chlumecký & 1 others

March 25, 202615 min read

Research

Torg Grabber: Anatomy of a New Credential Stealer

A newly identified MaaS credential stealer evolves from Telegram exfiltration to encrypted TCP and full REST API infrastructure

Threat Research Team's photo
Threat Research Team

March 24, 2026 • 68 min read

Research

The Malware with a Secret Identity: How We Unmasked Torg Grabber

How a “Vidar” look‑alike turned out to be Torg Grabber—a fast‑growing infostealer-as-a-service with ClickFix lures, browser lockpicks and a sprawling criminal customer base

Luis Corrons's photo
Luis Corrons

March 24, 2026 • 7 min read

Explore Insights Topics

Leadership Perspectives

Financial Safety 101 for Gen Z: Build It Before You Need It

Alisha Robinson's photo
Alisha Robinson

April 17, 2026 • 7 min read

Research

Chasing an Angry Spark

Threat Research Team's photo
Threat Research Team

April 14, 2026 • 29 min read

Research

Building a last-resort unpacker with AI

David Álvarez's photo
+1
David Álvarez & 1 others

April 13, 20268 min read

Research

Remus: Unmasking The 64-bit Variant of the Infamous Lumma Stealer

Vojtěch Krejsa's photo
+1
Vojtěch Krejsa & 1 others

April 7, 202634 min read

Research

Why Join the Navy if You Can Be a Pirate?

Adolf Středa's photo
+1
Adolf Středa & 1 others

March 31, 202612 min read

Research

From Celebrity Deepfakes to Avatar Farms, How Scammers Industrialize Trust

Luis Corrons's photo
+2
Luis Corrons & 2 others

March 26, 202610 min read

Research

The Reservation Hijack Scam: How attackers hijack hotel accounts to target guests

Martin Chlumecký's photo
+1
Martin Chlumecký & 1 others

March 25, 202615 min read

Research

Torg Grabber: Anatomy of a New Credential Stealer

Threat Research Team's photo
Threat Research Team

March 24, 2026 • 68 min read

Research

The Malware with a Secret Identity: How We Unmasked Torg Grabber

Luis Corrons's photo
Luis Corrons

March 24, 2026 • 7 min read