Apr 26, 2025Ravie LakshmananMalware / Vulnerability
Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing over access to double extortion ransomware gangs like CACTUS.
The IAB has been...
Small businesses are a prime target for cybercrime, as we highlighted in our last annual report. Many of the criminal threats we covered in that report remained a major menace in 2024, including ransomware–which remains a...
In the last week I ran into some issues that I hadn't anticipated:
Residential IP changed, some honeypots inacessible remotely
Rebuilit DShield-SIEM , Zeek logs not...
The China-linked threat actor known as Mustang Panda has been attributed to a cyber attack targeting an unspecified organization in Myanmar with previously unreported...
This appendix to our Annual Threat Report provides additional statistics on incident data and telemetry detailing the tools used by cybercriminals targeting small and...
GOFFEE is a threat actor that first came to our attention in early 2022. Since then, we have observed malicious activities targeting exclusively entities...
As promised in diary entry "XORsearch: Searching With Regexes", I will outline another method to search with xorsearch and regexes.
In stead of XORsearch.exe, the...