EXFILTRATOR-22 – An Emerging Post-Exploitation Framework
Executive Summary The CYFIRMA Research team has provided a preliminary analysis of a new post- exploitation
Executive Summary The CYFIRMA Research team has provided a preliminary analysis of a new post- exploitation
Introduction Vulnerabilities are a critical component of cyber-attacks, providing attackers with an
Executive Summary In November 2022, CYFIRMA detected a cyber-attack on an intelligence operative in
Learning Lessons And From Russia’s War On Ukraine, ETLM Takeaways Introduction Over the last few
Executive Summary Research team at CYFIRMA recently discovered a malicious PDF file being distributed
Executive Summary ChatGPT, an advanced language model developed by OpenAI, has the potential to revolutionize
Executive Summary Recently, researchers noticed various campaigns abusing Google Ads platform to deliver
Lessons from Russia’s cyber-war in Ukraine In February of the last year just as Russian tanks started
What About VPS A virtual private server (VPS) hosting offers a similar experience to dedicated hosting
Executive Summary In recent weeks ChatGPT by OpenAI started making waves around the world for its
Executive Summary CYFIRMA Research Team has been tracking three campaigns – Evian, UNC064, and
Inside the World of Initial Access Broker (IAB): Insights and Trends Initial Access Brokers (IABs)
Introduction The rise of the use of cyber criminals for privateering is a growing concern for organizations
Windows Internet Key Exchange (IKE) Remote Code Execution Vulnerability Analysis (CVE-2022-34721)
From North Korean Phishing to Underground Online Hosting Services Executive Summary During CYFIRMA’s
Prestige Ransomware Analysis Executive Summary CYFIRMA Research team has seen an uptick in threat
Executive Summary The CYFIRMA research team recently detected a malicious android APK targeting Indian
Executive Summary The CYFIRMA research team observed threat actors using free website builders to
Fortinet Authentication Bypass Vulnerability Exploited by Threat Actors EXECUTIVE SUMMARY A critical
Infostealer Prynt Malware a Deep Dive into Its Process Injection Technique EXECUTIVE SUMMARY CYFIRMA