Operation SyncHole: Lazarus APT goes back to the well ​

Operation SyncHole: Lazarus APT goes back to the well ​

Read More  We have been tracking the latest attack campaign by the Lazarus group since last November, as it targeted organizations in South Korea with a sophisticated combination of a watering hole strategy and vulnerability exploitation within South Korean software....
Lumma Stealer – Tracking distribution channels ​

Lumma Stealer – Tracking distribution channels ​

Read More  Introduction The evolution of Malware-as-a-Service (MaaS) has significantly lowered the barriers to entry for cybercriminals, with information stealers becoming one of the most commercially successful categories in this underground economy. Among these...
Phishing attacks leveraging HTML code inside SVG files ​

Phishing attacks leveraging HTML code inside SVG files ​

Read More  With each passing year, phishing attacks feature more and more elaborate techniques designed to trick users and evade security measures. Attackers employ deceptive URL redirection tactics, such as appending malicious website addresses to seemingly safe...