Taking on every threat you'll face, first.
As research-led practitioners, we seek out the most challenging cyber security problems we can find. And we love to solve them.
Some of the experience and insights we gather in the process are published here: you'll always have an expert on your side.
Unveiling the Arsenal: Exploring Attacker Toolsets and Tactics
As organizations strengthen their defenses, attackers adapt, employing increasingly sophisticated toolsets to fly under the radar and achieve their objectives. Understanding these malicious toolsets and their distinct objectives is important in safeguarding against cyber threats.
The Supply Chain Threat
In recent years, supply chain attacks have been numerous, successful, and highly impactful, the most recent example of which is the 3CX compromise. The obvious success of past supply chain attacks encourages attackers to attempt to replicate those successes.
The professionalization of cyber crime
Financially motivated cyber crime has been dominated by organized crime gangs for some time. The huge profits of ransomware have led to a rapid evolution and professionalization of the wider cyber crime industry.
Research bulletin: DUCKTAIL: An infostealer malware targeting Facebook business accounts
Research Bulletin: DUCKTAIL: An infostealer malware targeting Facebook business accounts
Join our mailing list
Subcribe to our Monthly Threat Highlights Report and other news and updates from WithSecure.