12 min read
MuddyWater Exposed: Inside an Iranian APT operation
5 min read
Bitbucket API Abuse: A Simple Trick for Stealthy Data Theft
10 min read
EtherRAT & SYS_INFO Module: C2 on Ethereum (EtherHiding), Target Selection, CDN-Like Beacons
9 min read
Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise
9 min read
Supply Chain Attack on Axios Pulls Malicious Dependency from NPM
9 min read
Under CTRL: Dissecting a Previously Undocumented Russian .Net Access Framework
8 min read
From Phishing to Exfiltration: A Deep Dive into PXA Stealer
6 min read
Elastic Security Labs uncovers BRUSHWORM and BRUSHLOGGER
11 min read
33K Exposed LiteLLM Deployments and the C2 Servers Behind TeamPCP’s Supply Chain Attack
7 min read
Abusing Legitimate Low-Level Tools to Help Ransomware Evade Antivirus Detection