☕ Grab your mug—February’s Dark Web Roast is served hot 🔥
From a threat actor selling power grid access for cheap to a crypto mixer using ASCII art vases, the underground is a masterclass in self-sabotage.
Read more: bit.ly/4shh3yt
AS-REP Roasting is back in the spotlight. 🔍 Our latest research walks through a live GetNPUsers.p attack scenario that Trellix Helix caught by technique-centric logic.
Read more: bit.ly/3Nb2Tjk
Threat alert 🚨 XWorm detections have surged 4.3x YoY. For just $500, threat actors use reflective DLL injection and LotL tactics to bypass legacy EDR.
High-impact RATs are no longer high-cost.
Read our full technical analysis. bit.ly/3MZnI17
Remcos RAT goes fileless.
🛡️By subverting trusted Windows processes and executing via RAM-only injection, it bypasses traditional AV and leaves no disk footprint. A masterclass in forensic evasion.
Full analysis: bit.ly/4ulrWRc
How have recent events reshaped Iran’s cyber landscape?
Against the backdrop of military action, details on many cyber threat groups remain obscured. We break down active groups, new structures, and evolving tradecraft.
Read the blog for more: bit.ly/4aQN3TR