Duty Analyst: Moises Salas Lopez

Blog

Insights & Blog

Research, detection engineering notes, and incident response lessons learned.

Latest

122 articles published.

Crypto24 Ransomware Group – EDR Bypass

Organizations across multiple sectors are grappling with attacks from theCrypto24 ransomware group, known for their sophisticated stealth techniques and EDR evasion. First observed in September 2024, Crypto24 has been leveraging legitimate Windows tools combined with custom malware to bypass security defenses and escalate privileges.Trend MicroandBleepingComputerconfirm that large-scale campaigns have already targeted financial, healthcare, and logistics networks.

The Growing Threat of DDoS Attacks And How to Defend Against Them

ADistributed Denial of Service (DDoS) attackis a malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming it with a flood of traffic from multiple sources. Unlike a basic Denial of Service (DoS) attack, which comes from a single source, DDoS attacks leveragebotnets— networks of compromised devices — to amplify their impact and make them harder to stop.

What Is Whale Phishing? Understanding Whaling Attacks

Cybercrime continues to evolve, and one of the most dangerous threats to businesses today iswhale phishing, also known aswhaling attacks. While most people are familiar with phishing emails targeting everyday users, whaling is far more sophisticated and far more damaging. In this article, we’ll break down what whale phishing is, how it differs from regular phishing, who is most vulnerable, and the severe consequences of falling victim to these attacks.