View Topics
The Anthropic AI Agents attack
BLOG | 8 min read
What the Anthropic report on AI espionage means for security leaders

What security leaders can learn from the Anthropic report on the recent AI espionage.

Learn More
BLOG | 17 min read
Beginner’s guide to malware analysis and reverse engineering

The article introduces a flexible and practical approach to malware analysis for beginners and experts alike.

Learn More
BLOG | 9 min read
Frankenstein Variant of the ToneShell Backdoor Targeting Myanmar
Learn More
new firewood variant cyber threat backdoor
BLOG | 6 min read
Threat Bulletin: Fire in the Woods – A New Variant of FireWood
Learn More
Phishing trends blog post image
BLOG | 14 min read
Emerging Phishing Techniques: New Threats and Attack Vectors

Discover advanced phishing techniques bypassing email security—Intezer reveals threats hidden in SVGs, PDFs, OneDrive, and OpenXML files.

Learn More
BLOG | 26 min read
XE Group: From Credit Card Skimming to Exploiting Zero-Days
Learn More
BLOG | 9 min read
Threat Bulletin: Weaponized Software Targets Chinese-Speaking Organizations
Learn More
BLOG | 19 min read
Babble Babble Babble Babble Babble Babble BabbleLoader
Learn More
BLOG | 12 min read
There’s Something About CryptBot: Yet Another Silly Stealer (YASS)
Learn More
BLOG | 12 min read
Dissecting SSLoad Malware: A Comprehensive Technical Analysis
Learn More
BLOG | 18 min read
Operation HamsaUpdate: A Sophisticated Campaign Delivering Wipers Puts Israeli Infrastructure at Risk
Learn More
BLOG | 17 min read
FBI Takedown: IPStorm Botnet Infrastructure Dismantled
Learn More