Archives: Out of Band

The Convergence of Infostealers and Ransomware : From Credential Harvesting to Rapid Extortion Chains
2026-02-01
The Convergence of Infostealers and Ransomware : From Credential Harvesting to Rapid Extortion Chains

EXECUTIVE SUMMARY Ransomware activity accelerated sharply from late 2025 into early 2026, with a growing

Fortnightly Vulnerability Summary
2026-01-31
Fortnightly Vulnerability Summary

Fortnightly Vulnerability Summary CHECK OUT THESE FAST FACTS ON FORTNIGHTLY OBSERVED VULNERABILITIES.

PlayCloak: A Play Store–Distributed Travel Utility Covertly Operating as a Financial Fraud and Cybercrime Platform
2026-01-30
PlayCloak: A Play Store–Distributed Travel Utility Covertly Operating as a Financial Fraud and Cybercrime Platform

EXECUTIVE SUMMARY The Android application Hicas, publicly advertised as a Smart Travel Packing Companion,

HEALTHCARE Q1 I 2026 : INDUSTRY REPORT
2026-01-27
HEALTHCARE Q1 I 2026 : INDUSTRY REPORT

EXECUTIVE SUMMARY The CYFIRMA Industry Report delivers original cybersecurity insights and telemetry-driven

Weaponized WinRAR Exploitation and Stealth Deployment of Fileless .NET RAT
2026-01-23
Weaponized WinRAR Exploitation and Stealth Deployment of Fileless .NET RAT

EXECUTIVE SUMMARY At CYFIRMA, we continuously monitor emerging threat techniques that abuse trusted

FINANCE Q1 I 2026 : INDUSTRY REPORT
2026-01-19
FINANCE Q1 I 2026 : INDUSTRY REPORT

EXECUTIVE SUMMARY The CYFIRMA Industry Report delivers original cybersecurity insights and telemetry-driven

Mamba Phishing-as-a-Service Kit: How Modern adversary-in-the-middle (AiTM) Attacks Operate
2026-01-16
Mamba Phishing-as-a-Service Kit: How Modern adversary-in-the-middle (AiTM) Attacks Operate

INTRODUCTION CYFIRMA assesses that Mamba 2FA is a representative of a broader class of adversary-in-the-middle

SOLYXIMMORTAL : PYTHON MALWARE ANALYSIS
2026-01-16
SOLYXIMMORTAL : PYTHON MALWARE ANALYSIS

EXECUTIVE SUMMARY SolyxImmortal is a Python-based Windows information-stealing malware that combines

APT PROFILE – KIMSUKI
2026-01-13
APT PROFILE – KIMSUKI

Kimsuki, an advanced persistent threat (APT) group active since at least 2012, is suspected to be

CYFIRMA ANNUAL INDUSTRIES REPORT 2025 : PART 3
2026-01-12
CYFIRMA ANNUAL INDUSTRIES REPORT 2025 : PART 3

EXECUTIVE SUMMARY The CYFIRMA Industries Report provides cutting-edge cybersecurity insights and telemetry-driven

TRACKING RANSOMWARE : DEC 2025
2026-01-09
TRACKING RANSOMWARE : DEC 2025

EXECUTIVE SUMMARY Ransomware activity in December 2025 highlights an evolution toward cartel-style,

Beyond MFA: Identity Abuse Through Token Interception and Consent Manipulation
2026-01-08
Beyond MFA: Identity Abuse Through Token Interception and Consent Manipulation

EXECUTIVE SUMMARY Multi-Factor Authentication (MFA) has long been positioned as a definitive control

CYFIRMA ANNUAL INDUSTRIES REPORT 2025 : PART 2
2026-01-05
CYFIRMA ANNUAL INDUSTRIES REPORT 2025 : PART 2

EXECUTIVE SUMMARY The CYFIRMA Industries Report provides cutting-edge cybersecurity insights and telemetry-driven

Resurgence of Scattered Lapsus$ hunters
2026-01-03
Resurgence of Scattered Lapsus$ hunters

Executive Summary: Recent monitoring of underground forums and Telegram communities has identified

Fortnightly Vulnerability Summary
2026-01-02
Fortnightly Vulnerability Summary

Fortnightly Vulnerability Summary CHECK OUT THESE FAST FACTS ON FORTNIGHTLY OBSERVED VULNERABILITIES.

CYFIRMA ANNUAL INDUSTRIES REPORT 2025 : PART 1
2025-12-31
CYFIRMA ANNUAL INDUSTRIES REPORT 2025 : PART 1

EXECUTIVE SUMMARY The CYFIRMA Industries Report provides cutting-edge cybersecurity insights and telemetry-driven

CYFIRMA ANNUAL INDUSTRIES REPORT 2025
2025-12-31
CYFIRMA ANNUAL INDUSTRIES REPORT 2025

EXECUTIVE SUMMARY The CYFIRMA Industries Report provides cutting-edge cybersecurity insights and telemetry-driven

APT36 : Multi-Stage LNK Malware Campaign Targeting Indian Government Entities
2025-12-30
APT36 : Multi-Stage LNK Malware Campaign Targeting Indian Government Entities

EXECUTIVE SUMMARY CYFIRMA has identified a targeted malware campaign attributed to APT36 (Transparent

PLAUSIBLE DENIABILITY IN CYBERSPACE : THE STRATEGIC USE OF HACKTIVIST PROXIES
2025-12-24
PLAUSIBLE DENIABILITY IN CYBERSPACE : THE STRATEGIC USE OF HACKTIVIST PROXIES

EXECUTIVE SUMMARY Hacktivist Proxy Operations describe a class of deniable cyber pressure activities

APT36 LNK-BASED MALWARE CAMPAIGN LEVERAGING MSI PAYLOAD DELIVERY
2025-12-19
APT36 LNK-BASED MALWARE CAMPAIGN LEVERAGING MSI PAYLOAD DELIVERY

EXECUTIVE SUMMARY CYFIRMA is dedicated to providing advanced warning and strategic analysis of the