AsyncRAT in Action: Fileless Malware Techniques and Analysis of a Remote Access Trojan

September 10, 2025 | Sean Shirley

Hunting Malware with MSHTA and CyberChef: A Deep Dive into Obfuscation in Malicious Scripts and Credential Theft

May 21, 2025 | Sean Shirley

Recently, our team came across an alert involving mshta.exe, a native Windows ...

MMRat: A New Banking Trojan

September 28, 2023 | Arjun Patel

The content of this post is solely the responsibility of the author. LevelBlue ...

The cat and mouse game: Staying ahead of evolving cybersecurity threats

September 07, 2023 | Anas Baig

The content of this post is solely the responsibility of the author. LevelBlue ...

OneNote documents have emerged as a new malware infection vector

May 10, 2023 | Philip Okoh

The content of this post is solely the responsibility of the author. LevelBlue ...

Dridex Malware, the Banking Trojan

March 28, 2023 | Benny Liu

The content of this post is solely the responsibility of the author. LevelBlue ...

GuLoader – a highly effective and versatile malware that can evade detection

February 15, 2023 | Luke Song

The content of this post is solely the responsibility of the author. LevelBlue ...

Back to the office…

July 12, 2021 | James Prince

As the world is starting to move out of lockdown, businesses are moving some of ...

The importance of creating a small business Cybersecurity plan

April 29, 2021 | Silvana Carpineanu

This blog was written by an independent guest blogger.

What is Vizom malware? Everything you need to know

December 01, 2020 | Theodoros Karasavvas

This blog was written by an independent guest blogger.

LokiBot Malware: What it is and how to respond to it   

October 28, 2020 | Nahla Davies

This blog was written by an independent guest blogger.

How malware mimics the spread of COVID-19

May 27, 2020 | Katelyn Ilkani

It’s a weird time to be alive. Millions of people globally are living under ...

Recalling the ILOVEYOU worm from 20 years ago

May 06, 2020 | Edwardo Rodriguez

Twenty years ago, the ILOVEYOU worm utilized the most basic human emotion, the ...

Hacking prevention: tips to reduce your attack surface

March 19, 2020 | Mike Klepper

These days it seems that every time you open your favorite news source there is ...

6 Reasons you Should Consider an Annual Penetration Testing Especially in Healthcare

February 15, 2020 | Bindu Sundaresan

Breaches are widely observed in the healthcare sector and can be caused by many ...

Siegeware and BAS attacks, an emerging threat

April 17, 2019 | Joe Robinson

As technological solutions to cybercrime become increasingly advanced, able to ...

Explain YARA Rules to Me: What is YARA?

February 06, 2019 | Monty St John

Introduction I like YARA. Every time I hear its name spoken aloud it makes me ...

Life of a Worm

April 11, 2018 | Javvad Malik

This is a story of a computer worm, from the time it was coded and deployed ...

North Korean Cyber-Attacks and Collateral Damage

February 15, 2018 | Chris Doman

**OSSIM is no longer in use as we focus on delivering enhanced solutions for ...

OTX Trends Part 2: Malware

January 23, 2018 | Chris Doman

By Javvad Malik and Christopher Doman

Fileless Attacks are Driving Up Security Complexity & Costs

January 03, 2018 | Mike Duffy

If you feel like it’s getting harder and more expensive to protect your company ...

The Impact of NotPetya and WannaCry

December 11, 2017 | Javvad Malik

Another wake up call Every time there is a major security incident many people ...

Newly Discovered Iranian APT Group Brings State-sponsored Cyber Espionage into Focus

October 17, 2017 | Jake Mosher

State-sponsored cyber espionage has been rising steadily in recent years. ...

2017 Ransomware Report

October 05, 2017 | Kate Brew

Cybersecurity Insiders, partnering with the 380,000+ member Information ...

One Man Cyber Attacked 4,000 Companies; Don't Let It Happen to You

August 29, 2017 | Kim Crawley

A cyber-attack over the past four months was discovered which targeted more ...

Stackhackr : Build Your Own Mock Malware, Then Test Your Own Security

August 15, 2017 | Jack Danahy

Over the past 25 years or so, while developing a variety of security products, ...

A RAT that Tweets: New ROKRAT Malware Hides behind Twitter, Amazon, and Hulu Traffic

June 21, 2017 | Danielle Russell

To carry out attacks, malware and botnets rely on communication with a Command ...

StoneDrill: Shamoon Wiper Attacks Reloaded – Notes from the Underground

March 28, 2017 | Danielle Russell

Nothing can tarnish a great film like a terrible sequel: The Matrix Reloaded, ...