Erbium InfoStealer Enters the Scene: Characteristics and Origins
Erbium InfoStealer Enters the Scene: Characteristics and Origins
September 15, 2022

On the 21st of July 2022 on a DWW (Deep/Dark Web) forum, a Russian speaking threat actor created an announcement about t...

LockBit 3.0: “Making the ransomware great again”
LockBit 3.0: “Making the ransomware great again”
July 6, 2022

LockBit is a major player in the ransomware scene and has contributed heavily for this cyber-crime model to become one o...

The Lotus Panda is Awake Again: Analysis of the Last Strike
The Lotus Panda is Awake Again: Analysis of the Last Strike
April 29, 2022

NAIKON is the name of an APT (Advanced Persistent Threat) which is believed to originate from China. The Naikon hacker g...

Conti's Source Code: Deep Dive
Conti's Source Code: Deep Dive
March 2, 2022

 INTRODUCTION On 25.02.2022 cybercrime group Conti published the following statement on their shame blog:   The post was...

2021 Ransomware Bulletin: Recent, Past and Near Future of Cyber Extortion
2021 Ransomware Bulletin: Recent, Past and Near Future of Cyber Extortion
January 12, 2022

This past year 2021 was characterized by an increase in ransomware incidents, not only in regards to occurrence but also...