5 min read
Cyber Threat Intelligence Report
This week, we briefed our clients on the importance of practicing and documenting the process of pulling logs—it can be more challenging than it sounds.

Read our latest threat intelligence, produced by our team of battle-hardened analysts and experts.
5 min read
This week, we briefed our clients on the importance of practicing and documenting the process of pulling logs—it can be more challenging than it sounds.
8 min read
This week, for Cybersecurity Awareness Month, we briefed our clients on the most common threats facing every organization (hint: they tend to target...
5 min read
This week, we briefed our clients on a fake Microsoft Teams malware campaign that lures users to spoofed download sites with malvertising & SEO poisoning.
5 min read
This week, we briefed our clients on two major supply chain attacks targeting npm (Node Package Manager) maintainers and next month's Microsoft EOS.
6 min read
This week, we briefed our clients on TamperedChef, an infostealer delivered by a malware campaign luring victims into downloading a malicious PDF editor.
8 min read
This week, we briefed our clients on a new ransomware group called Warlock, and a new attack technique called DOM-based extension clickjacking.
5 min read
This week, we briefed our clients on Akira's exploit of SonicWall SSL VPN devices. There's conflicting reports on the cause. Passwords or something new?
7 min read
This week, we briefed our clients on new TTPs from the Interlock ransomware gang and how to protect your organization from the SharePoint vulnerabilities.
5 min read
This week, we briefed our clients on more FileFix research. This new data reveals how they utilize .hta files to avoid warnings and execute malicious code.
6 min read
This week, we briefed our clients on FileFix, a more familiar tactic to tricking users into executing malicious code on their system using File Explorer.