The Most Wonderful (and Risky) Time of the Year For most retailers, the holiday period represents the peak of the business calendar – a time when transactions soar, new promotions launch daily, and digital infrastructure runs hot. Unfortunately, threat actors also know this and as retail teams focus on customer Continue Reading
Pivot, Pivot! Using Open-Source Data to Support Shared Intelligence
Introduction: The Art of the Pivot In threat intelligence, the difference between a collection of indicators and a coherent threat picture often comes down to one skill: pivoting. Pivoting is the process of following digital breadcrumbs – domains to IP addresses, hashes to infrastructure, alias to forum post, following the Continue Reading
Android Application Malware Analysis: Sturnus
Android malware is still prevalent in the mobile application space and 2025 has seen a list of new families. Dipping my toe back into the waters, I wanted to take a look at some of latest malware to appear on the scene, initially starting with, Sturnus. This malware is known Continue Reading