S2WinS2W BLOGDetailed Analysis of TheftCalls: Impersonating Frequently Used Korean AppsAuthor: BLKSMTH (Threat Analysis Team) & IntelOps | S2W TALONNov 7Nov 7
S2WinS2W BLOGUnmasking CVE-2024-38178: The Silent Threat of Windows Scripting EngineAuthor: Hosu Choi, Minyeop Choi | S2W TalonOct 16Oct 16
S2WinS2W BLOGRansomware Landscape in H1 2024: Statistics and Key IssuesAuthor: HuiSeong Yang, HyeongJun Kim, SeungHo LeeOct 14Oct 14
S2WinS2W BLOG[VirusBulletin 2024] The Phantom Syndicate: a hacking collective with a North Korean allegianceAuthor : Olivia Lee | S2W TALONOct 2Oct 2
S2WinS2W BLOG[VirusBulletin 2024] Go-ing Arsenal: A Closer Look at Kimsuky’s Go Strategic AdvancementAuthor: Jiho Kim | S2W TALONOct 2Oct 2
S2WinS2W BLOGThreat Tracking: Analysis of puNK-003’s Lilith RAT ported to AutoIt ScriptAuthor: Jiho Kim | S2W TALONAug 22Aug 22
S2WinS2W BLOGTellYouThePass: Ransomware Attacks Exploits Critical PHP RCE VulnerabilityAuthor: S2W TALONAug 1Aug 1
S2WinS2W BLOG[FIRSTCON 2024] Dissecting the Arsenals of LockBitAuthor: Huiseong Yang | S2W TALONJun 13Jun 13
S2WinS2W BLOGTrends of Telegram DaaS (DDoS as a Service) groups: their hacktivist motivations, attack techniques…Author: HOTSAUCE (Threat Detection Team) | S2W TALONJun 7Jun 7
S2WinS2W BLOGDeep Analysis of SecretCalls, A formidable app for notorious Korean financial fraudsters (Part 2)Author: S2W TALONApr 30Apr 30