Hunting for Mythic in network traffic ​

Hunting for Mythic in network traffic ​

Read More  Post-exploitation frameworks Threat actors frequently employ post-exploitation frameworks in cyberattacks to maintain control over compromised hosts and move laterally within the organization’s network. While they once favored closed-source frameworks, such...
Shai Hulud 2.0, now with a wiper flavor ​

Shai Hulud 2.0, now with a wiper flavor ​

Read More  In September, a new breed of malware distributed via compromised Node Package Manager (npm) packages made headlines. It was dubbed “Shai-Hulud”, and we published an in-depth analysis of it in another post. Recently, a new version was discovered. Shai Hulud...
Exploits and vulnerabilities in Q3 2025 ​

Exploits and vulnerabilities in Q3 2025 ​

Read More  In the third quarter, attackers continued to exploit security flaws in WinRAR, while the total number of registered vulnerabilities grew again. In this report, we examine statistics on published vulnerabilities and exploits, the most common security issues...