
An Introduction to Operational Relay Box (ORB) Networks – Unpatched, Forgotten, and Obscured
Although not a new concept, Operational Relay Box (ORB) networks—often referred to as "covert," "mesh," or "obfuscated" networks—are ... Read More

Insights into a “Cyber Attack” against the Venezuelan National Electoral Council
About Team Cymru Internet weather reports Our Internet weather reports are intended to provide data and technical analysis of significant ... Read More

FIN7: The Truth Doesn’t Need to be so STARK
First and foremost, our thanks go to the threat research team at Silent Push and the security team at Stark Industries Solutions ... Read More

Botnet 7777: Are You Betting on a Compromised Router?
Firstly, we extend our thanks to Chris Fearnley and Gi7w0rm, two threat researchers who assisted us behind the scenes with our ... Read More
Latrodectus: This Spider Bytes Like Ice
For this research, we partnered with Proofpoint’s Threat Research team in a collaborative effort to provide a comprehensive overview of ... Read More

Team Cymru: Internet Weather Report
Insights into Internet Outages along Africa's Western Coast About Team Cymru: Internet Weather Reports Our Internet weather reports are ... Read More

Coper / Octo – A Conductor for Mobile Mayhem… With Eight Limbs?
Analysis of an Android Malware-as-a-Service Operation Coper, a descendant of the Exobot malware family, was first observed in the wild in ... Read More

Visualizing Qakbot Infrastructure Part II: Uncharted Territory
A Data-Driven Approach Based on Analysis of Network Telemetry In this blog post, we will provide an update on our high-level analysis of ... Read More

Inside the IcedID BackConnect Protocol (Part 2)
Introduction In this blog post, we will provide an update on our continued analysis and tracking of infrastructure associated with ... Read More

Darth Vidar: The Aesir Strike Back
At the beginning of this year, we released a detailed publication on Vidar infrastructure, encompassing both the primary administrative ... Read More