Search
Home
Request an Invite
Thank You
old - Collaboration Submission
Thank You-Submission
DomainTools Investigation - Submit to Collaborate
Home
Request an Invite
Thank You
old - Collaboration Submission
Thank You-Submission
DomainTools Investigation - Submit to Collaborate
Search
Home
Request an Invite
Thank You
old - Collaboration Submission
Thank You-Submission
DomainTools Investigation - Submit to Collaborate
Back to Home
Malware
Google
Malware
SpyNote
Threat Intelligence
SpyNote Malware Part 2
Deceptive websites are mimicking popular Android application install pages on the Google Play Store to lure victims into...
DNS
LummaStealer
Malware
Threat Intelligence
Hunting for Malware Networks
Hunting for new malware delivery infrastructure often entails the identification and tracking of common techniques to deliver...
DNS
Malware
Malware in DNS
Because it's always DNS, we wanted to share this fun finding of malware stored across DNS TXT records.
Disinformation
Hacktivism
Malware
Threat Intelligence
CyberAv3ngers: From Infrastructure Hacks to Propaganda Machines in the Iran-Israel Cyber War
As the conflict between Iran and Israel escalated in early 2025, it quickly expanded beyond missiles and airstrikes into...
AI
Malware
Phishing
Ransomware
Threat Intelligence
Cybersecurity Reading List - Week of 2025-06-16
June arrives with more heat, everywhere, and not just regarding the weather. Law enforcement is counting up some recent disruption...
Cybercrime
Malware
Threat Intelligence
Eggs in a Cloudy Basket: Skeleton Spider’s Trusted Cloud Malware Delivery
FIN6 and Financially Motivated Cybercrime Skeleton Spider, also known as FIN6, is a long-running financially motivated cybercrime...
Malware
Threat Intelligence
How Threat Actors Exploit Human Trust: A Breakdown of the 'Prove You Are Human' Malware Scheme
This report details a malicious campaign that uses deceptive websites, including spoofed Gitcodes and fake Docusign verification...
Malware
Threat Intelligence
Inside a VenomRAT Malware Campaign
A malicious campaign using a fake website to spread VenomRAT, a Remote Access Trojan (RAT), is detailed in this analysis....
AI
Malware
Phishing
Ransomware
Threat Intelligence
Cybersecurity Reading List - Week of 2025-05-19
May as well. No, I really mean it: we have to endure May as well? Oof, buddies, oof. The horrors persist, but so do...
AI
Cybercrime
Malware
Threat Intelligence
Scams and Malicious Domains Emerging from Breaking News
In the fast-paced digital landscape, viral media events capture global attention. From natural disasters and geopolitical...