Lazarus Stealer : Android Malware for Russian Bank Credential Theft Through Overlay and SMS Manipulation
EXECUTIVE SUMMARY At CYFIRMA, we deliver actionable intelligence on emerging cyber threats impacting
EXECUTIVE SUMMARY At CYFIRMA, we deliver actionable intelligence on emerging cyber threats impacting
EXECUTIVE SUMMARY The REVENANT project exposes a multi-stage, execution less attack methodology capable
The Lazarus Group is a highly sophisticated, state-sponsored cyber threat group attributed to the
EXECUTIVE SUMMARY The CYFIRMA Industry Report delivers original cybersecurity insights and telemetry-driven
INTRODUCTION – A DECADE OF AGGRESSION For the past several years, an emboldened China has intensified
EXECUTIVE SUMMARY In July 2025, ransomware activity remained high, with major impacts on consumer
EXECUTIVE SUMMARY The CYFIRMA Industries Report delivers original cybersecurity insights and telemetry-driven
Executive Summary CYFIRMA Threat Intelligence has observed an ongoing malicious campaign leveraging
Fortnightly Vulnerability Summary CHECK OUT THESE FAST FACTS ON FORTNIGHTLY OBSERVED VULNERABILITIES.
EXECUTIVE SUMMARY A sophisticated phishing campaign, possibly attributed to Pakistan-linked APT36
EXECUTIVE SUMMARY The CYFIRMA Industries Report delivers original cybersecurity insights and telemetry-driven
EXECUTIVE SUMMARY Raven Stealer is a modern, lightweight, information-stealing malware developed primarily
ANDROID MALWARE POSING AS INDIAN BANK APPS EXECUTIVE SUMMARY At CYFIRMA, we are committed to delivering
Executive Summary At CYFIRMA, we are dedicated to providing current insights into prevalent threats
EXECUTIVE SUMMARY The CYFIRMA Industry Report delivers original cybersecurity insights and telemetry-driven
EXECUTIVE SUMMARY CVE‑2025‑5777 is a critical information disclosure vulnerability in Citrix NetScaler
EXECUTIVE SUMMARY The CYFIRMA Industry Report delivers original cybersecurity insights and telemetry-driven
Fancy Bear, also known as APT28, is a notorious Russian cyberespionage group with a long history of
Fortnightly Vulnerability Summary CHECK OUT THESE FAST FACTS ON FORTNIGHTLY OBSERVED VULNERABILITIES.
EXECUTIVE SUMMARY The Octalyn Forensic Toolkit, publicly hosted on GitHub, presents itself as a research-oriented