8 min read
Cyber Threat Intelligence Report
This week, we briefed our clients on how Gootloader bypasses cybersecurity tools. We also show how Shinyhunters uses vishing to access major SSO portals.
Read More
8 min read
This week, we briefed our clients on how Gootloader bypasses cybersecurity tools. We also show how Shinyhunters uses vishing to access major SSO portals.
Read More
5 min read
This week, we briefed our clients on a new ClickFix campaign that uses an urgent phishing email and a fake Windows Blue Screen of Death to trick the user.
6 min read
This week, we reviewed 2025 statistics with our clients, including ransomware, ClickFix, software vulnerabilities, supply chain compromises, and AI usage.
6 min read
This week, we briefed our clients on ConsentFix, which allows a threat actor to access a victim's Microsoft account without a password or MFA prompt.
5 min read
This week, we briefed our clients on new lures being used by the “Most Common Attack Method in 2025" (observed in 47% of all attacks) - ClickFix.
5 min read
This week, we briefed our clients on an update to the FBI/CISA #StopRansomware: Akira Ransomware advisory that focused on newly observed campaign TTPs.
5 min read
This week, we briefed our clients on the importance of practicing and documenting the process of pulling logs—it can be more challenging than it sounds.
8 min read
This week, for Cybersecurity Awareness Month, we briefed our clients on the most common threats facing every organization (hint: they tend to target...
5 min read
This week, we briefed our clients on a fake Microsoft Teams malware campaign that lures users to spoofed download sites with malvertising & SEO poisoning.
5 min read
This week, we briefed our clients on two major supply chain attacks targeting npm (Node Package Manager) maintainers and next month's Microsoft EOS.