Latest in Insights

Research

From Celebrity Deepfakes to Avatar Farms, How Scammers Industrialize Trust

When the face is familiar but the person isn’t real

Luis Corrons's photo
+2
Luis Corrons & 2 others

March 26, 202610 min read

Research

The Reservation Hijack Scam: How attackers hijack hotel accounts to target guests

From Booking-themed lures to compromised hospitality software, criminals are using reservation data and trusted workflows to make fraud feel like customer service.

Martin Chlumecký's photo
+1
Martin Chlumecký & 1 others

March 25, 202615 min read

Research

Torg Grabber: Anatomy of a New Credential Stealer

A newly identified MaaS credential stealer evolves from Telegram exfiltration to encrypted TCP and full REST API infrastructure

Threat Research Team's photo
Threat Research Team

March 24, 2026 • 68 min read

Research

The Malware with a Secret Identity: How We Unmasked Torg Grabber

How a “Vidar” look‑alike turned out to be Torg Grabber—a fast‑growing infostealer-as-a-service with ClickFix lures, browser lockpicks and a sprawling criminal customer base

Luis Corrons's photo
Luis Corrons

March 24, 2026 • 7 min read

Research

The Scam Ad Machine: Part II

How scam ads hide in plain sight, survive takedowns, and keep coming back

Luis Corrons's photo
+4
Luis Corrons & 4 others

March 20, 202612 min read

Research

VoidStealer: Debugging Chrome to Steal Its Secrets

A Novel Debugger-based ABE Bypass Spotted in the Wild

Vojtěch Krejsa's photo
Vojtěch Krejsa

March 19, 2026 • 19 min read

Research

Fingerprinting AI Agent Skills: The Missing Identity Layer for Agent Plugins

Why AI agent skills need their own fingerprint: a content-based ID that stays stable across packaging, platforms and marketplaces

Michal Salát's photo
Michal Salát

March 17, 2026 • 17 min read

Research

Engineering the Future of Agentic Threat Hunting

An Army for Every Analyst

Luis Corrons's photo
Luis Corrons

March 13, 2026 • 7 min read

Research

Promptmorphism: How LLMs Are Mass-Producing Disposable Stage 1 Loaders

How malware authors use LLM‑driven “promptmorphism” to endlessly reshape loaders—and what defenders must do to keep up

Threat Research Team's photo
Threat Research Team

March 13, 2026 • 8 min read

Explore Insights Topics

Research

From Celebrity Deepfakes to Avatar Farms, How Scammers Industrialize Trust

Luis Corrons's photo
+2
Luis Corrons & 2 others

March 26, 202610 min read

Research

The Reservation Hijack Scam: How attackers hijack hotel accounts to target guests

Martin Chlumecký's photo
+1
Martin Chlumecký & 1 others

March 25, 202615 min read

Research

Torg Grabber: Anatomy of a New Credential Stealer

Threat Research Team's photo
Threat Research Team

March 24, 2026 • 68 min read

Research

The Malware with a Secret Identity: How We Unmasked Torg Grabber

Luis Corrons's photo
Luis Corrons

March 24, 2026 • 7 min read

Research

The Scam Ad Machine: Part II

Luis Corrons's photo
+4
Luis Corrons & 4 others

March 20, 202612 min read

Research

VoidStealer: Debugging Chrome to Steal Its Secrets

Vojtěch Krejsa's photo
Vojtěch Krejsa

March 19, 2026 • 19 min read

Research

Fingerprinting AI Agent Skills: The Missing Identity Layer for Agent Plugins

Michal Salát's photo
Michal Salát

March 17, 2026 • 17 min read

Research

Engineering the Future of Agentic Threat Hunting

Luis Corrons's photo
Luis Corrons

March 13, 2026 • 7 min read

Research

Promptmorphism: How LLMs Are Mass-Producing Disposable Stage 1 Loaders

Threat Research Team's photo
Threat Research Team

March 13, 2026 • 8 min read