Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

volexity.com

Get the latest updates from directly as they happen.

Follow now 105 followers

Latest posts

Last updated 17 days ago

Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows

17 days ago

KEY TAKEAWAYS Since early March 2025, Volexity has observed multiple Russian threat...

GoResolver: Using Control-flow Graph Similarity to Deobfuscate Golang Binaries, Automatically

about 1 month ago

KEY TAKEAWAYS Go language (Golang) is increasing in popularity with developers of...

Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication

3 months ago

KEY TAKEAWAYS Volexity has observed multiple Russian threat actors conducting social-engineering and...

The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access

6 months ago

KEY TAKEAWAYS Russian APT GruesomeLarch deployed a new attack technique leveraging Wi-Fi...

BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA

6 months ago

KEY TAKEAWAYS Volexity discovered and reported a vulnerability in Fortinet's Windows VPN...

StormBamboo Compromises ISP to Abuse Insecure Software Update Mechanisms

9 months ago

KEY TAKEAWAYS StormBamboo successfully compromised an internet service provider (ISP) in order...

DISGOMOJI Malware Used to Target Indian Government

11 months ago

Note: Volexity has reported the activity described in this blog and details...

Detecting Compromise of CVE-2024-3400 on Palo Alto Networks GlobalProtect Devices

12 months ago

Last month, Volexity reported on its discovery of zero-day, in-the-wild exploitation of...

Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400)

about 1 year ago

Volexity would like to thank Palo Alto Networks for their partnership, cooperation,...

3CX Supply Chain Compromise Leads to ICONIC Incident

about 2 years ago

On Wednesday, March 29, 2023, Volexity became aware of a supply chain...

Using Memory Analysis to Detect EDR-Nullifying Malware

about 2 years ago

In the ever-changing cybersecurity landscape, threat actors are forced to evolve and...

₿uyer ₿eware: Fake Cryptocurrency Applications Serving as Front for AppleJeus Malware

over 2 years ago

₿uyer ₿eware: Fake Cryptocurrency Applications Serving as Front for AppleJeus Malware Over...