Anomaly detection in cybersecurity has long promised the ability to identify threats by highlighting deviations from expected behavior. When it comes to identifying malicious...
Oct 06, 2025Ravie LakshmananNetwork Security / Cyber Espionage
A Chinese company named the Beijing Institute of Electronics Technology and Application (BIETA) has been assessed to...
Introduction
When it comes to digital forensics, AmCache plays a vital role in identifying malicious activities in Windows systems. This artifact allows the identification of...
I have been writing about the ".well-known" directory a few times before. Recently, about attackers hiding webshells , and before that, about the purpose...
U.S. prosecutors last week levied criminal hacking charges against 19-year-old U.K. national Thalha Jubair for allegedly being a core member of Scattered Spider, a...
Over the past year and a bit more, we’ve monitored a constellation of events that share a set of general attributes:
Malware impersonating, subverting, and...
Sep 27, 2025Ravie LakshmananMalware / Network Security
Telecommunications and manufacturing sectors in Central and South Asian countries have emerged as the target of an ongoing...