New Infection Chain and ConfuserEx-Based Obfuscation for DarkCloud Stealer
DarkCloud Stealer’s delivery has shifted. We explore three different attack chains that use ConfuserEx obfuscation and a final payload in
Read More03-01
DarkCloud Stealer’s delivery has shifted. We explore three different attack chains that use ConfuserEx obfuscation and a final payload in
Read MoreFirst comes swiping, then comes… scams? Online dating can lead to lasting love, but it can also open the door
Read MoreIn March 2025, Akamai received a bug bounty report identifying an HTTP Request Smuggling vulnerability that was quickly resolved for
Read MoreMuddled Libra gets media attention due to its consistent playbook and unique use of vishing. The group’s English fluency is
Read MoreSQL Injection (SQLi), a vulnerability almost as old as database-driven web applications themselves (CWE-89), persists as a classic example of
Read MoreWe’re excited to launch SFI patterns and practices: a new library of actionable guidance designed to help organizations implement security
Read MoreClaude Code stormed onto the programming scene when Anthropic launched it in February of this year. It moved, what Andrej
Read MoreIn a move designed to bolster the security of rapidly expanding AI ecosystems, we’ve teamed up with Portkey, AI gateway
Read MoreBadSuccessor is an attack vector in Windows Server 2025. Under certain conditions it allows privilege elevation via dMSAs. We analyze
Read More