SCYTHE 5.1 Released  Read More
Posts about

malware analysis

When Trusted Updates Turn Malicious: The Notepad++ Supply Chain Attack

Threat Intelligence Malware Analysis Supply Chain Between June and...

Read More

JScript Dropper: From Malware Analysis to Continuous Emulation

Threat Intelligence Malware Analysis Red Team Static malware analysis...

Read More

MuddyWater Displaying New Tactics and Intriguing Malware

How MuddyWater Leveled Up Its Game.

Read More

APT28 — BadPaw / MeowMeow: From Manual Lab to Continuous Emulation

A technical analysis of the APT28 BadPaw/MeowMeow campaign, showing how manual...

Read More

Sandstorms Causing Turbulence In Your Organization: APT33's Cyber Espionage Playbook

Defending Against APT33: Cybersecurity Best Practices for Organizations Bottom...

Read More

Interlock Ransomware Threat: Joint CISA-FBI Advisory

On July 22, 2025, the Cybersecurity and Infrastructure Security Agency (CISA),...

Read More

Threat Thursday: 2024 in Review

The cybersecurity landscape continues to evolve, with threat actors...

Read More

Threat Emulation: APT36

Welcome to the July 2023 SCYTHE #ThreatThursday! This edition features an...

Read More

Threat Emulation: APT27

Intro Welcome to the April 2023 SCYTHE #ThreatThursday! This edition features...

Read More

Threat Emulation: Black Basta

Intro Welcome to the October 2022 SCYTHE #ThreatThursday! This edition...

Read More