Threat Reports, Tools
& Research

Free threat intelligence reports, security whitepapers, CVE advisories, and detection tools from our research team โ€” no registration required.

๐Ÿ”ด Threat Intelligence Reports

Subscribe for weekly reports โ†’
๐Ÿ“Š
REPORT

LATAM Threat Landscape Q1 2026 โ€” RansomHub, DragonForce & Emerging Actors

Comprehensive analysis of ransomware and cybercriminal activity targeting Latin American organizations in Q1 2026. Includes IOCs, TTPs mapped to MITRE ATT&CK, and sector-specific risk ratings.

๐ŸŒ
REPORT

APT28 & APT29 Activity in South America: 2025-2026 Campaign Analysis

Detailed analysis of Russian state-sponsored threat actor activity targeting government, defense, and critical infrastructure in LATAM. Attribution evidence and network IOCs included.

๐Ÿฆ
REPORT

Financial Sector Threat Report: Banking Trojans & BEC Campaigns in Chile & Colombia

Tracking Mekotio, Grandoreiro, and BEC campaigns targeting Chilean and Colombian banking institutions. Phishing templates, infrastructure, and attribution details.

๐Ÿ“˜ Technical Whitepapers

๐Ÿ”‘
WHITEPAPER

Active Directory Attack Paths: A Defender's Complete Reference for 2026

Every major AD attack technique โ€” Kerberoasting, AS-REP roasting, ADCS ESC1-13, DCSync, Golden/Silver Ticket โ€” with detection rules and hardening guidance for each.

โ˜๏ธ
WHITEPAPER

AWS IAM Privilege Escalation: 32 Paths from Low-Privilege User to Administrator

Comprehensive catalog of AWS IAM privilege escalation paths with exploitation code, CloudTrail detection queries, and SCPs to prevent each vector.

๐Ÿ“ก
WHITEPAPER

C2 Traffic Obfuscation: Detection & Defense Against Malleable Profiles

How modern C2 frameworks blend into legitimate traffic, and how network defenders can build detection logic that identifies beacons despite heavy obfuscation.

โš ๏ธ CVE Advisories & Security Bulletins

๐Ÿ”ด
CRITICAL

CVE-2026-1337: RCE in Apache Struts โ€” Exploitation Observed in the Wild

Critical remote code execution vulnerability in Apache Struts 6.x actively exploited. Our team observed exploitation attempts within 6 hours of disclosure. Includes PoC analysis and detection rules.

๐ŸŸ 
HIGH

CVE-2026-0892: Entra ID Token Forgery โ€” MFA Bypass via Conditional Access Flaw

Authentication bypass in Microsoft Entra ID allows attackers to forge session tokens and bypass MFA enforcement under specific conditional access configurations.

๐Ÿ”ด
CRITICAL

CVE-2025-44228 Redux: Log4Shell-Class Vulnerability in Popular Java Framework

New JNDI injection vulnerability in a widely-deployed Java logging framework. Similar blast radius to Log4Shell. Mass exploitation expected within 24 hours.