Key takeaways Check Point Research (CPR) recently uncovered Styx Stealer, a new malware capable of stealing browser data, instant ...
Executive Summary Research by Erez Goldberg Server-Side Template Injection (SSTI) vulnerabilities refer to weaknesses in web ...
Packers or crypters are widely used to protect malicious software from detection and static analysis. These auxiliary tools, through the use ...
Key Points Magnet Goblin is a financially motivated threat actor that quickly adopts and leverages 1-day vulnerabilities in ...