Malware
Emulating the Destructive WhisperGate Malware
AttackIQ has released a new attack graph that seeks to emulate the Tactics, Techniques and Procedures (TTPs) associated with the destructive WhisperGate malware. The post Emulating the Destructive WhisperGate Malware appeared first ...

Ransomware Rising – Understanding, Preventing and Surviving Cyber Extortion
Over the past 6 months I have been researching ransomware, and not even from the technical angle (which would very tempting and no doubt, enlightening in it’s own right), but from a ...
Emulating the Opportunistic and Lightweight Lumma Stealer
AttackIQ has released a new assessment template that addresses the numerous post-compromise Tactics, Techniques, and Procedures (TTPs) associated with the subscription-based information stealer known as Lumma Stealer. The post Emulating the Opportunistic ...

Air-Gapped Systems Breached: A Deep Dive into the Attack and Prevention
Once considered impregnable bastions of security, air-gapped systems have been shown to be vulnerable to sophisticated attacks. These systems, physically isolated from networks, were believed to be immune to remote hacking ...
Perfectl Malware
Perfectl in an impressive piece of malware: The malware has been circulating since at least 2021. It gets installed by exploiting more than 20,000 common misconfigurations, a capability that may make millions ...
Domain Reputation Update Apr 2024 – Sept 2024
This reporting period our domain experts observed 36 million new domains and listed 1.8 million domains. In a surprising turn of events - “apple” dropped out of the Top 20 phishing terms! ...
Emulating the Surging Hadooken Malware
AttackIQ has released a new attack graph that emulates the behaviors exhibited by the Hadooken malware during intrusions that abused misconfigurations and critical Remote Code Execution (RCE) vulnerabilities on public-facing Oracle Weblogic ...

Securing Your Code: Combating Malware in the Software Supply Chain
Malware has emerged as one of the most significant threats to modern software development, especially within open-source ecosystems. This panel will explore the rise of malware attacks on the software supply chain ...
Emulating the Persistent and Stealthy Ebury Linux Malware
AttackIQ has released a new attack graph that seeks to emulate the Tactics, Techniques and Procedures (TTPs) associated with Ebury Linux malware. Despite previous arrests and actions against key perpetrators, Ebury continues ...

Malvertising and Google Ads: Protecting High Net-Worth Individuals and Executives
Do you use Google’s Search functionality to find products or services to solve a problem you have? I’m guessing that the majority of people reading this article do this regularly or have ...