Research

  • DPRK IT Workers | A Network of Active Front Companies and Their Links to China - 11/21/2024

  • AcidPour | New Embedded Wiper Variant of AcidRain Appears in Ukraine - 03/21/2024

  • Elephant Hunting | Inside an Indian Hack-For-Hire Group - 11/16/2023

  • The Israel-Hamas War | Cyber Domain State-Sponsored Activity of Interest - 10/24/2023

  • Cyber Soft Power | China’s Continental Takeover - 09/21/2023

  • Comrades in Arms? | North Korea Compromises Sanctioned Russian Missile Engineering Company - 08/07/2023

  • JumpCloud Intrusion | Attacker Infrastructure Links Compromise to North Korean APT Activity - 07/20/2023

  • Winter Vivern | Uncovering a Wave of Global Espionage - 03/16/2023

  • NoName057(16) – The Pro-Russian Hacktivist Group Targeting NATO - 01/12/2023

  • Void Balaur | The Sprawling Infrastructure of a Careless Mercenary - 09/22/2022

  • Russian Organizations Increasingly Under Attack By Chinese APTs - 07/07/2022

  • Chinese Threat Actor Scarab Targeting Ukraine - 03/24/2022

  • ModifiedElephant APT and a Decade of Fabricating Evidence - 02/09/2022

  • Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers - 05/03/2018

  • Turla Watering Hole Campaigns 2016/2017 - 10/10/2017

  • Winnti (LEAD/APT17) Evolution - Going Open Source - 07/11/2017