Latest in Insights

Research

When Malware Authors Study Algebra: The Group Theory Inside Bedep's DGA

A closer look at how Bedep used foreign exchange data and advanced math to generate hard-to-predict domains, making its command-and-control infrastructure more difficult for defenders to block and disrupt

Threat Research Team's photo
Threat Research Team

April 22, 2026 • 15 min read

Leadership Perspectives

Financial Safety 101 for Gen Z: Build It Before You Need It

From budgeting to scams to identity theft, here’s how Gen Z can build a financial foundation that actually holds up online

Alisha Robinson's photo
Alisha Robinson

April 17, 2026 • 7 min read

Research

Chasing an Angry Spark

A VM-obfuscated backdoor observed on a single machine in the UK, operated for one year, and vanished without a trace.

Threat Research Team's photo
Threat Research Team

April 14, 2026 • 29 min read

Research

Building a last-resort unpacker with AI

Exploring how AI can assist in unpacking protected binaries, recovering payloads from unsupported packers, while reducing repetitive analysis

David Álvarez's photo
+1
David Álvarez & 1 others

April 13, 20268 min read

Research

Remus: Unmasking The 64-bit Variant of the Infamous Lumma Stealer

The Lumma Rebrand We’ve Been Waiting For?

Vojtěch Krejsa's photo
+1
Vojtěch Krejsa & 1 others

April 7, 202634 min read

Research

Why Join the Navy if You Can Be a Pirate?

Though you might sometimes become cargo. Inside the macOS Cracked Software Pipeline

Adolf Středa's photo
+1
Adolf Středa & 1 others

March 31, 202612 min read

Research

From Celebrity Deepfakes to Avatar Farms, How Scammers Industrialize Trust

When the face is familiar but the person isn’t real

Luis Corrons's photo
+2
Luis Corrons & 2 others

March 26, 202610 min read

Research

The Reservation Hijack Scam: How attackers hijack hotel accounts to target guests

From Booking-themed lures to compromised hospitality software, criminals are using reservation data and trusted workflows to make fraud feel like customer service.

Martin Chlumecký's photo
+1
Martin Chlumecký & 1 others

March 25, 202615 min read

Research

Torg Grabber: Anatomy of a New Credential Stealer

A newly identified MaaS credential stealer evolves from Telegram exfiltration to encrypted TCP and full REST API infrastructure

Threat Research Team's photo
Threat Research Team

March 24, 2026 • 68 min read

Explore Insights Topics

Research

When Malware Authors Study Algebra: The Group Theory Inside Bedep's DGA

Threat Research Team's photo
Threat Research Team

April 22, 2026 • 15 min read

Leadership Perspectives

Financial Safety 101 for Gen Z: Build It Before You Need It

Alisha Robinson's photo
Alisha Robinson

April 17, 2026 • 7 min read

Research

Chasing an Angry Spark

Threat Research Team's photo
Threat Research Team

April 14, 2026 • 29 min read

Research

Building a last-resort unpacker with AI

David Álvarez's photo
+1
David Álvarez & 1 others

April 13, 20268 min read

Research

Remus: Unmasking The 64-bit Variant of the Infamous Lumma Stealer

Vojtěch Krejsa's photo
+1
Vojtěch Krejsa & 1 others

April 7, 202634 min read

Research

Why Join the Navy if You Can Be a Pirate?

Adolf Středa's photo
+1
Adolf Středa & 1 others

March 31, 202612 min read

Research

From Celebrity Deepfakes to Avatar Farms, How Scammers Industrialize Trust

Luis Corrons's photo
+2
Luis Corrons & 2 others

March 26, 202610 min read

Research

The Reservation Hijack Scam: How attackers hijack hotel accounts to target guests

Martin Chlumecký's photo
+1
Martin Chlumecký & 1 others

March 25, 202615 min read

Research

Torg Grabber: Anatomy of a New Credential Stealer

Threat Research Team's photo
Threat Research Team

March 24, 2026 • 68 min read