• Exploring Strela Stealer: Initial Payload Analysis and Insights

    In cybersecurity research, it's easy to get caught up in the pursuit of uncovering new [...]

  • Hiding in Plain Sight: The Subtle Art of Loki Malware’s Obfuscation

    With the surge of cyberattacks, sharing threat intelligence in the form of insights, trends, and [...]

  • How to use Logpoint pySigma Backend for threat detection

    There’s no doubt that open-source projects are immense contributors to the software ecosystem. With an [...]

  • Shenanigans of Scheduled Tasks

    Updated August 26, 2024Scheduled Tasks are the automated processes configured to run automatically at a [...]

  • TTPs of Russian SVR-affiliated Threat Actor Exploiting CVE-2023-42793

    Recently, CISA, along with the National Cyber Security Centre (NCSC) of the United Kingdom, the Polish [...]

  • Emerging Threat: APT-29 – The Not So Cozy Bear

    The Dukes, or Cozy Bear, is a heavily financed, deeply dedicated, and efficiently coordinated cyber [...]

  • Emerging Threats: Emotet-ually Unstable – The resurgence of a nuisance

    By Anish Bogati, Logpoint Global Services and Security ResearchContentsTL;DRWhat is Emotet?Fast FactsBackgroundEmotet operations, tactics and [...]