Fake LockBit, Real Damage: Ransomware Samples Abuse AWS S3 to Steal Data

From infostealer development to data exfiltration, cloud service providers are increasingly being abused by threat actors for malicious schemes. While in this case the ransomware samples we examined contained hard coded AWS credentials, this is specific to this single threat Read More …

How Israel harnesses technology to advance its offensive in Middle East

In September, thousands of pagers exploded across Lebanon in what seemed to be a sophisticated attack planned months in advance by Israel, turning the spotlight on the country’s cyber capabilities and its use of artificial intelligence (AI) in warfare. Since Read More …