Published inS2W BLOGDetailed Analysis of TheftCalls: Impersonating Frequently Used Korean AppsAuthor: BLKSMTH (Threat Analysis Team) & IntelOps | S2W TALONNov 7Nov 7
Published inS2W BLOGUnmasking CVE-2024-38178: The Silent Threat of Windows Scripting EngineAuthor: Hosu Choi, Minyeop Choi | S2W TalonOct 16Oct 16
Published inS2W BLOGRansomware Landscape in H1 2024: Statistics and Key IssuesAuthor: HuiSeong Yang, HyeongJun Kim, SeungHo LeeOct 14Oct 14
Published inS2W BLOG[VirusBulletin 2024] The Phantom Syndicate: a hacking collective with a North Korean allegianceAuthor : Olivia Lee | S2W TALONOct 2Oct 2
Published inS2W BLOG[VirusBulletin 2024] Go-ing Arsenal: A Closer Look at Kimsuky’s Go Strategic AdvancementAuthor: Jiho Kim | S2W TALONOct 2Oct 2
Published inS2W BLOGThreat Tracking: Analysis of puNK-003’s Lilith RAT ported to AutoIt ScriptAuthor: Jiho Kim | S2W TALONAug 22Aug 22
Published inS2W BLOGTellYouThePass: Ransomware Attacks Exploits Critical PHP RCE VulnerabilityAuthor: S2W TALONAug 1Aug 1
Published inS2W BLOG[FIRSTCON 2024] Dissecting the Arsenals of LockBitAuthor: Huiseong Yang | S2W TALONJun 13Jun 13
Published inS2W BLOGTrends of Telegram DaaS (DDoS as a Service) groups: their hacktivist motivations, attack techniques…Author: HOTSAUCE (Threat Detection Team) | S2W TALONJun 7Jun 7
Published inS2W BLOGDeep Analysis of SecretCalls, A formidable app for notorious Korean financial fraudsters (Part 2)Author: S2W TALONApr 30Apr 30