Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown
On March 4, 2026, Europol announced the technical disruption of Tycoon2FA, a subscription-based phishing-as-a-service (PhaaS) platform…
On March 4, 2026, Europol announced the technical disruption of Tycoon2FA, a subscription-based phishing-as-a-service (PhaaS) platform…
To defend themselves, security leaders need clarity on which adversaries to watch, the details of their…
Adversaries’ ability to easily establish seemingly legitimate infrastructure poses significant risks to organizations of all sizes….
GOLDEN CHOLLIMA Shared infrastructure elements and tool cross-pollination indicate these units maintain close coordination. All three…
Under the Hood: How It Works Step 3: Dynamic behavioral analysis Step 5: Similar sample identification…
WARP PANDA demonstrates a high level of stealth and almost certainly focuses on maintaining persistent, long-term,…
In terms of methodology, voice phishing and fake CAPTCHA pages have become key enablers for gaining…
The eCrime threat landscape in the Asia Pacific and Japan (APJ) region is quickly evolving, driven…
The observed activity appears to begin with an HTTP POST request to /OA_HTML/SyncServlet, which initiates the…
Many security teams struggle with threat hunting because they don’t know where to start or what…
Since late 2024, CrowdStrike Counter Adversary Operations has observed significant activity conducted by MURKY PANDA, a…
This enhanced workflow turns every indicator into actionable intelligence so teams can conduct smarter, faster investigations….
Today’s enterprising adversaries are weaponizing AI to scale operations, accelerate attacks, and target the autonomous AI…
SCATTERED SPIDER, an eCrime adversary, has recently broadened its target scope to include the aviation sector,…
Introduction Effective collaboration is essential when confronting today’s sophisticated cyber adversaries, particularly those operating with state…