
Phishing or Malware? Unpacking a Combo 2-in-1 Threat

Pavlo Prodanchuk
May 9, 2025

Unmasking the Lumma Stealer Campaign


Jyotika Singh & Prashant Kumar
May 7, 2025

FormBook Malware Distributed via Horus Protector Using Word Docs


Lydia McElligott & Prashant Kumar
April 28, 2025

How Rural Healthcare Providers Can Fight Ransomware Threats

Tim Herr
April 3, 2025

XWorm Malware Targets United Kingdom’s Hospitality Sector

Lydia McElligott
December 23, 2024

Hackers Will Increasingly Build Malware Campaigns on Legitimate Infrastructure Services



Mayur Sewani & Ben Gibney & Hassan Faizan
November 4, 2024

Mitigate the Two Biggest Risks of Shadow IT with Web Security

Corey Kiesewetter
October 22, 2024

Malicious JavaScript Code Sent Through Emails via PEC (Posta Elettronica Certificata)

Hassan Faizan
October 11, 2024

Tweaking AsyncRAT: Attackers Using Python and TryCloudflare to Deploy Malware

Mayur Sewani
August 26, 2024