• Raspberry Robin, Not a Juicy Raspberry You Love

    Fast facts Raspberry Robin, previously disseminated through USB drives, now employs Discord for distribution. The [...]

  • Inside DarkGate: Exploring the infection chain and capabilities

    As the threat landscape continually evolves, some positive developments, such as authorities tracking down Maldevs, [...]

  • A Comprehensive Overview on Stealer Malware Families

    Fast FactsOver the last seven years, there has been a noticeable increase in the sale [...]

  • Unveiling the ScreenConnect Authentication Bypass (CVE-2024-1709 & CVE-2024-1708)

    On February 19, 2024, ConnectWise issued a critical advisory concerning two highly concerning vulnerabilities, namely [...]

  • The importance of visibility for effective cloud security

    The greater adoption of cloud technology has transformed how organizations operate, expand, and consume resources. [...]

  • Pikabot: A Sophisticated and Modular Backdoor Trojan with Advanced Evasion Techniques

    Fast FactsPikabot is a multi-staged backdoor trojan that emerged in early 2023.The most notable feature [...]

  • Stay compliant – secure your sensitive assets!

    Digitalization of our societies is evolving at an unprecedented pace, increasing our reliance on digital [...]

  • Free up more resources to get the most security

    Despite the continuous evolution of cybersecurity, there is always a strong human factor in play, [...]

  • End of the year Report: The cybersecurity rollercoaster of 2023

    Global cyber onslaughts were witnessed in 2023 across industries, affecting many organizations, and exposing millions [...]

  • Logpoint 2024: The Perfect Storm – 5 Predictions

    The year 2024 just started, so it’s time to share our predictions for what the [...]

  • Cloud Transformation in Cybersecurity: Moving from On-Prem to Cloud Security

    The adoption of cloud computing has accelerated in recent years, driven by the flexibility, scalability, [...]

  • New Reality: APTs Boost Sophisticated Cyber Attacks

    With the report "Attack on Danish Critical Infrastructure," the Danish SectorCERT delves into the recently [...]