171 articles
Research

Defeating AuraStealer: Practical Deobfuscation Workflows for Modern Infostealers

Vojtěch Krejsa's photo
Vojtěch Krejsa
December 18, 2025 • 36 min read
Research

GhostPairing Attacks: from phone number to full access in WhatsApp

Luis Corrons's photo
+1
Luis Corrons & 1 others
December 15, 202517 min read
Research

Holiday scams: How fraudsters exploit the shopping season and how to stay safe

Ľuboš Bever's photo
Ľuboš Bever
December 8, 2025 • 7 min read
Research

Alliances of convenience: How APTs are beginning to work together

Threat Research Team's photo
Threat Research Team
November 19, 2025 • 9 min read
Research

DPRK’s Playbook: Kimsuky’s HttpTroy and Lazarus’s New BLINDINGCAN Variant

Alexandru-Cristian Bardaș's photo
Alexandru-Cristian Bardaș
October 30, 2025 • 20 min read
Research

VibeScams: How AI website builders are shaping the internet

Jan Rubín's photo
+2
Jan Rubín & 2 others
October 27, 202512 min read
Research

Decrypted: Midnight Ransomware

Samuel Vojtáš's photo
Samuel Vojtáš
October 27, 2025 • 5 min read
Research

Decrypted: FunkSec Ransomware

Ladislav Zezula's photo
Ladislav Zezula
July 29, 2025 • 11 min read
Research

Neptune and the legacy of XWORM

Ajin Deepak's photo
Ajin Deepak
July 22, 2025 • 8 min read
Research

I know what you are doing this summer: What AI knows about you

Michalis Pachilakis's photo
Michalis Pachilakis
July 22, 2025 • 13 min read
Research

Lazarus’ latest tactics: Deceptive development and ClickFix

Alexandru-Cristian Bardaș's photo
Alexandru-Cristian Bardaș
July 22, 2025 • 4 min read
Research

Ransomware Inc. The Business Model Behind LockBit's Millions

Samuel Vojtáš's photo
Samuel Vojtáš
July 3, 2025 • 8 min read
1-12 of 171 results