
The New Face of Remcos: Path Bypass and Masquerading

Mayur Sewani
June 25, 2025

Phishing or Malware? Unpacking a Combo 2-in-1 Threat

Pavlo Prodanchuk
May 9, 2025

Unmasking the Lumma Stealer Campaign


Jyotika Singh & Prashant Kumar
May 7, 2025

FormBook Malware Distributed via Horus Protector Using Word Docs


Lydia McElligott & Prashant Kumar
April 28, 2025

An X-Labs Guide to Ransomware and How it Works

Prashant Kumar
January 13, 2025

XWorm Malware Targets United Kingdom’s Hospitality Sector

Lydia McElligott
December 23, 2024

Hackers Will Increasingly Build Malware Campaigns on Legitimate Infrastructure Services



Mayur Sewani & Ben Gibney & Hassan Faizan
November 4, 2024

Mitigate the Two Biggest Risks of Shadow IT with Web Security

Corey Kiesewetter
October 22, 2024

Malicious JavaScript Code Sent Through Emails via PEC (Posta Elettronica Certificata)

Hassan Faizan
October 11, 2024