Cybersecurity

Sponsored
by

Cybersecurity / Industry Updates

A DNS Exploration of Operation Olalampo

MuddyWater's Operation Olalampo targets MENA entities using new malware and Telegram-based control, as DNS analysis uncovers fresh infrastructure, thousands of linked domains, and expanded indicators pointing to a broader, coordinated campaign.

DNS Deep Dive: LummaStealer + CastleLoader = Larger Threat

LummaStealer's revival, paired with CastleLoader, reveals a more evasive malware ecosystem, leveraging obfuscation, DNS agility and vast infrastructure to reach over 100,000 potential victims while spawning hundreds of linked malicious domains and IPs globally observed.

A Look Back at 11 of the Red Report 2026 Featured Threats

An analysis of 11 cyber threats from Red Report 2026 reveals how attackers exploit core MITRE ATT&CK techniques, with DNS and IoC data exposing early warning signals, infrastructure scale, and evolving tactics across campaigns globally.

A Close Look under the DNS Hood of CoolClient

Security researchers trace an updated CoolClient backdoor used by HoneyMyte, uncovering malicious domains, subdomains and IP links, and revealing a wider infrastructure of email and DNS-connected assets tied to data theft operations globally active.

Probing the DNS Depths of PeckBirdy

An analysis of DNS and WHOIS data tied to the PeckBirdy C&C framework uncovers expanded infrastructure, linking known IoCs to malicious domains, IPs, and email-connected assets across years of activity.

Greater Cyber Resilience Through AI: eco - Association Publishes 5-Step Plan for Companies

eco Association of the Internet Industry releases a white paper outlining a five-step framework to help companies integrate AI securely, counter emerging threats like deepfakes and phishing, and strengthen cyber resilience.

What Remains of Black Basta Now That Alleged Gang Leader Joined the Most Wanted List?

As authorities pursue Black Basta's alleged leader, new analysis of campaign indicators reveals sprawling infrastructure, thousands of linked domains, and persistent ransomware tactics that rely on phishing, known vulnerabilities, and double-extortion pressure.

Top 10 Malware of Q4 2025: A DNS Deep Dive

An analysis of 46 DNS indicators tied to seven of Q4 2025's most prevalent malware families reveals early warning signals, coordinated campaigns and hundreds of connected artifacts, underscoring the predictive power of proactive threat intelligence.

Exploring the State of Network Infrastructure in 2026

As networks grow faster and more interconnected in 2026, they are also becoming more opaque and fragile, as outsourcing, blurred accountability and AI-driven threats expose deep weaknesses beneath expanding digital infrastructure.

A Look Back at the Top Ransomware Attack Targeting the Salesforce Supply Chain

A sprawling ransomware campaign targeting Salesforce's SaaS supply chain topped 2025's breach rankings, exposing millions of records. Fresh DNS analysis uncovered 8,318 linked artifacts, revealing how overlooked indicators foreshadowed widespread, multisector disruption.