Blog / Threat Research
Threat Research

Einstein's Wormhole: Capturing Outlook & Google Calendars via Salesforce Guest User Bug

Nov 02, 2021
If your organization uses Salesforce Communities and Einstein Activity Capture, you might have unknowingly exposed your administrator's Outlook or Google calendar events to the internet due to a bug called...

BlackMatter Ransomware: In-Depth Analysis & Recommendations

Nov 02, 2021
CISA has issued a security bulletin regarding the BlackMatter 'big game hunter' ransomware group following a sharp increase in cases targeting U.S. businesses. To mitigate these attacks, it is recommended...

Abusing Misconfigured Salesforce Communities for Recon and Data Theft

Oct 21, 2021
Our research team has discovered numerous publicly accessible Salesforce Communities that are misconfigured and expose sensitive information.

Good for Evil: DeepBlueMagic Ransomware Group Abuses Legit Encryption Tools

Oct 19, 2021
A group known as "DeepBlueMagic" is suspected of launching a ransomware attack against Hillel Yaffe Medical Center in Israel, violating a loose "code of conduct" that many ransomware groups operate...

Lessons from the Twitch Data Leak

Oct 07, 2021
What happened? Increasingly covered by the mainstream press throughout Wednesday, October 6, 2021, the impact of the recent Twitch leak will undoubtedly grow as bad actors take advantage of the...

Threat Update 50 – Critical Salesforce Misconfiguration

Aug 11, 2021
Salesforce is the lifeblood of many organizations. The amount of critical, and sensitive information stored within is astronomical – however, there are parts of the solution designed to be accessed by non-corporate users, such as the Community module.

Threat Update 34 – Isn't the Internet Supposed to be Bombproof?

Apr 15, 2021
Kilian & Ryan dissect what could happen if a major data center went down, and how organizations leveraging cloud technology or solutions can prepare for business continuity.

Return of the Darkside: Analysis of a Large-Scale Data Theft Campaign

Mar 18, 2021
Our team has recently led several high-profile investigations of attacks attributed to an up-and-coming cybercrime group, Darkside ransomware

How to Unpack Malware with x64dbg

Mar 17, 2021
This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated.

Threat Update - Mass Exploitation of On-Prem Exchange Servers

Mar 04, 2021
On March 2nd, Microsoft released an urgent software update to patch 4 critical vulnerabilities in Exchange Server 2010, 2013, 2016, and 2019. Our IR and Forensics teams are actively helping organizations patch,...

February 2021 Malware Trends Report

Feb 18, 2021
This Februrary 2021 malware trends report is intended to help you better understand the evolving threat landscape and adapt your defenses accordingly.

Threat Update 23 - Bypassing Endpoint Controls Using Office Macros

Feb 01, 2021
So many attacks start with a simple booby-trapped document that runs malicious code. Crafty attackers can even customize the payload to bypass endpoint controls! Don’t believe us? Check out this...
No overhead. Just outcomes.