RSS
Threat Research
Ransomware
cybercrime
state-sponsored ransomware
victimization
Eeny, meeny, miny, moe? How ransomware operators choose victims
virtual machine
ISPs
Malicious use of virtual machine infrastructure
Featured
GOLD SALEM
Warlock
GOLD SALEM tradecraft for deploying Warlock ransomware
featured
GOLD SALEM’s Warlock operation joins busy ransomware landscape
.lnk
DLL sideloading
GOLD BLADE
RedLoader
Sophos X-Ops
webdav
GOLD BLADE remote DLL sideloading attack deploys RedLoader
AI Research
AI
Dark Web
threat activity cluster
threat actors
Using AI to identify cybercrime masterminds
ctu
Dragonforce
Gold Harvest
RansomHub
scattered spider
DragonForce targets rivals in a play for dominance
ChatGPT
Cybercrime Forums
FraudGPT
LLM
malware
Telegram
WormGPT
Cybercriminals can’t agree on GPTs
Naked Security
hacking
IoT
TP-LINK
WinRAR
S3 Ep149: How many cryptographers does it take to change a light bulb?
scams
S3 Ep148: Remembering crypto heroes