
Unmasking the Lumma Stealer Campaign


Jyotika Singh & Prashant Kumar
May 7, 2025

FormBook Malware Distributed via Horus Protector Using Word Docs


Lydia McElligott & Prashant Kumar
April 28, 2025

How Rural Healthcare Providers Can Fight Ransomware Threats

Tim Herr
April 3, 2025

Grandoreiro Trojan Distributed via Contabo-Hosted Servers in Phishing Campaigns

Mayur Sewani
March 27, 2025

Hackers Will Increasingly Build Malware Campaigns on Legitimate Infrastructure Services



Mayur Sewani & Ben Gibney & Hassan Faizan
November 4, 2024

Mitigate the Two Biggest Risks of Shadow IT with Web Security

Corey Kiesewetter
October 22, 2024

Malicious JavaScript Code Sent Through Emails via PEC (Posta Elettronica Certificata)

Hassan Faizan
October 11, 2024

Tweaking AsyncRAT: Attackers Using Python and TryCloudflare to Deploy Malware

Mayur Sewani
August 26, 2024

Security News You Can Use—Issue 17

Lionel Menchaca
August 2, 2024