Search
Home
Request an Invite
Thank You
old - Collaboration Submission
Thank You-Submission
DomainTools Investigation - Submit to Collaborate
Home
Request an Invite
Thank You
old - Collaboration Submission
Thank You-Submission
DomainTools Investigation - Submit to Collaborate
Search
Home
Request an Invite
Thank You
old - Collaboration Submission
Thank You-Submission
DomainTools Investigation - Submit to Collaborate
Back to Home
Malware
Disinformation
Hacktivism
Malware
Threat Intelligence
CyberAv3ngers: From Infrastructure Hacks to Propaganda Machines in the Iran-Israel Cyber War
As the conflict between Iran and Israel escalated in early 2025, it quickly expanded beyond missiles and airstrikes into...
AI
Malware
Phishing
Ransomware
Threat Intelligence
Cybersecurity Reading List - Week of 2025-06-16
June arrives with more heat, everywhere, and not just regarding the weather. Law enforcement is counting up some recent disruption...
Cybercrime
Malware
Threat Intelligence
Eggs in a Cloudy Basket: Skeleton Spider’s Trusted Cloud Malware Delivery
FIN6 and Financially Motivated Cybercrime Skeleton Spider, also known as FIN6, is a long-running financially motivated cybercrime...
Malware
Threat Intelligence
How Threat Actors Exploit Human Trust: A Breakdown of the 'Prove You Are Human' Malware Scheme
This report details a malicious campaign that uses deceptive websites, including spoofed Gitcodes and fake Docusign verification...
Malware
Threat Intelligence
Inside a VenomRAT Malware Campaign
A malicious campaign using a fake website to spread VenomRAT, a Remote Access Trojan (RAT), is detailed in this analysis....
AI
Malware
Phishing
Ransomware
Threat Intelligence
Cybersecurity Reading List - Week of 2025-05-19
May as well. No, I really mean it: we have to endure May as well? Oof, buddies, oof. The horrors persist, but so do...
AI
Cybercrime
Malware
Threat Intelligence
Scams and Malicious Domains Emerging from Breaking News
In the fast-paced digital landscape, viral media events capture global attention. From natural disasters and geopolitical...
Malicious Download
Malware
Threat Intelligence
Newly Registered Domains Distributing SpyNote Malware
Deceptive websites hosted on newly registered domains are being used to deliver AndroidOS SpyNote malware. These sites mimic...
C2
Malware
Chinese Malware Delivery Domains Part II: Data Collection
This report dives deeper into activity relating to the previously reported cluster of Chinese Malware Delivery domains. Spoofed...
C2
Malware
Chinese Malware Delivery Websites
Malicious Browsers, Messengers, VPNs, and More… Hundreds of newly registered domains are actively targeting Chinese-speaking...