Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security Bulletin: Rha-Rha-Rhadamanthys Information Stealer

The origin of the word “Rhadamanthys”, goes back to Greek mythology where he was a legendary figure who ruled as king of Crete. Born to Zeus and Europa, he held the status of demigod and was renowned for his wisdom. Rhadamanthys Stealer is a sophisticated information stealer written in C++ that employs multiple evasion techniques. The malware utilizes a custom packer for code obfuscation and incorporates anti-VM and anti-debugging mechanisms to prevent analysis.

How to Set Up Proactive Threat Intelligence

What is the best way to avoid suffering multi-million-dollar security incidents? Know your cyber enemy in advance. This means having quality threat intelligence on all the threats targeting your business, industry, or country. Let's take a look at one of the most effective methods of collecting intel that your organization can use to better predict, detect, and respond to cyber attacks.

OSINT Framework: How Open Source Intelligence Powers Cybersecurity

Open Source Intelligence (OSINT) is the backbone of modern cybersecurity investigations, helping analysts and law enforcement uncover threats, assess risks, and gather intelligence from publicly available sources. In this guide, we break down everything you need to know about OSINT, from key frameworks and tools to how it's used in cybersecurity.

Security Bulletin: Fake Reddit Sites and Lumma Stealer

A new campaign distributing the notorious Lumma Stealer malware has been discovered by security analyst Crep1x at Sekoia. Threat actors are utilizing over 80 second-level domains to generate over 1,000 fully qualified domain names impersonating Reddit and WeTransfer. Websites impersonating Reddit feature a fake thread designed to deceive victims into downloading the malware.

The Need for Contextualised Threat Intelligence

In today’s digital landscape, cyber threats are evolving at an unprecedented pace, growing more sophisticated and harder to detect. With each passing day, businesses and individuals alike find themselves navigating an increasingly complex threat environment. This complexity isn’t just about the number of attacks, it’s about their evolving tactics, the widening attack surface, and the sheer difficulty of distinguishing real threats from background noise.

Threat Intelligence's Role in Cybersecurity

Threat intelligence, also referred to as cyber threat intelligence (CTI), is evidence-based data that’s been collected from a variety of sources, processed, and analyzed to help both organizations and individuals understand recent cyber attacks as well as threat actors’ motivations, tactics, behaviors, and potential next steps.

Ransomware in the Global Healthcare Industry

Following the World Health Organisation (WHO) hosting a webinar to discuss the critical importance of cybersecurity in the healthcare sector, it is clear the severity of the situation the industry is facing is coming to the fore. Healthcare organizations are increasingly relying on digital systems to facilitate their daily workflow, but the prevalence of outdated legacy technology in the sector is rendering it vulnerable to cyberattacks with severe consequences.
Featured Post

The Core Pillars of Cyber Resiliency

As we enter a new era of cybersecurity threats, which has prompted the evolution of new vulnerabilities, organisations are challenged on how to best respond to these evolving attacks. The threat landscape is more complex than ever causing organisations to grapple with new tactics to safeguard their critical data.

How Threat Intelligence is Transforming Pentesting & Red Teaming

Are You Testing for Compliance or Preparing for Real Attacks? Cybersecurity isn’t just about checking boxes—it’s about staying ahead of threats. Many businesses rely on Penetration Testing (Pentesting) and Red Teaming to identify vulnerabilities. However, these traditional methods often assume that attackers play by the same rules as defenders. Reality has other plans.