
Phishing or Malware? Unpacking a Combo 2-in-1 Threat

Pavlo Prodanchuk
May 9, 2025

Unmasking the Lumma Stealer Campaign


Jyotika Singh & Prashant Kumar
May 7, 2025

FormBook Malware Distributed via Horus Protector Using Word Docs


Lydia McElligott & Prashant Kumar
April 28, 2025

The Return of Pharmacy-Themed Spam

Hassan Faizan
April 25, 2025

Grandoreiro Trojan Distributed via Contabo-Hosted Servers in Phishing Campaigns

Mayur Sewani
March 27, 2025

Joint FBI/CISA Advisory Highlights Medusa Ransomware Threat

Tim Herr
March 19, 2025

VHDs Used to Distribute VenomRAT and Other Malware

Prashant Kumar
March 13, 2025

AsyncRAT Reloaded: Using Python and TryCloudflare for Malware Delivery Again

Jyotika Singh
January 31, 2025

An X-Labs Guide to Ransomware and How it Works

Prashant Kumar
January 13, 2025