Contact CRAG
Blog
Your inside look at what's on our mind...
Services
Pricing
Managed IT
Services
NOC
Pricing
Onboarding
Managed Security
Service
SOC
Pricing
Onboarding
Managed Compliance
Service
Details
Pricing
About
About
Services
How We Work
How We Succeed
Partnerships
Request a Quote
Beware of the Bait: Malicious USPS Ad Fishing for Banking Credentials
Learn More
BlueNoroff | How DPRK’s macOS RustBucket Seeks to Evade Analysis and Detection
Learn More
Chinese Threat Actors Targeting Europe in SmugX Campaign
Learn More
Honeypot Recon: Enterprise Applications Honeypot - Unveiling Findings from Six Worldwide Locations
Learn More
Welcome to New York: TA453's Intriguing Foray into LNKs and Mac Malware
Learn More
Georgia elections official downplays cybersecurity threats despite report
Learn More
Newly Uncovered ThirdEye Windows-Based Malware Steals Sensitive Data
Learn More
Preventing Cyberattacks on Schools Starts With K–12 Cybersecurity Education
Learn More
Some Lumberton ISD employees' personal data leaked in cybersecurity hack
Learn More
Vulnerability Hunting: Threat Hunting’s Cybersecurity Cousin
Learn More
Hackers Use Weaponized PDF Files to Attack Organizations
Learn More
Kimsuky Distributing CHM Malware Under Various Subjects
Learn More
Kimsuky Distributing CHM Malware Under Various Subjects
Learn More
RedEyes Group Wiretapping Individuals (APT37)
Learn More
Why Malware Crypting Services Deserve More Scrutiny
Learn More
Android Malware Impersonates ChatGPT-Themed Applications
Learn More
COSMICENERGY: New OT Malware Possibly Related To Russian Emergency Response Exercises
Learn More
CVE-2017-9248 Exploitation in U.S. Government IIS Server
Learn More
MOVEit Cyber Attack
Learn More
Pirated Windows builds with crypto stealer that penetrates EFI partition
Learn More
Analysis of the RecordBreaker secret-stealing Trojan spread through video sites
Learn More
Asylum Ambuscade: crimeware or cyberespionage?
Learn More
CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability
Learn More
DynamicRAT — A full-fledged Java Rat
Learn More
MOVEit Transfer Exploited to Drop File-Stealing SQL Shell
Learn More
Analysis of the CloudWizard APT framework
Learn More
Back in Black: BlackByte Ransomware returns with its New Technology (NT) version
Learn More
BlackCat Ransomware Deploys New Signed Kernel Driver
Learn More
Malvertising via brand impersonation is back again
Learn More
SME Tip 1
Learn More
SME Tip 2
Learn More
SME Tip 3
Learn More
SME Tip 4
Learn More
SME Tip 5
Learn More
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques
Learn More
AndoryuBot’s DDOS Rampage
Learn More
BianLian Ransomware Group
Learn More
OilAlpha: A Likely Pro-Houthi Group Targeting Entities Across the Arabian Peninsula
Learn More
Qakbot C2s
Learn More
The distinctive rattle of APT SideWinder
Learn More
AuKill EDR killer malware abuses Process Explorer driver
Learn More
Fake system update drops Aurora stealer via Invalid Printer loader
Learn More
SideWinder Uses Server-side Polymorphism to Attack Pakistan Government Officials — and Is Now Targeting Turkey
Learn More
Sophisticated DarkWatchMan RAT Spreads Through Phishing Sites
Learn More
Threat Assessment: Royal Ransomware
Learn More
1877 Team: A Kurdish hacker group on the rise
Learn More
Atomic Stealer | Threat Actor Spawns Second Variant of macOS Malware Sold on Telegram
Learn More
BlackBit Ransomware: A Threat from the Shadows of LokiLocker
Learn More
New KEKW Malware Variant Identified in PyPI Package Distribution
Learn More
Raspberry Robin: A global USB malware campaign providing access to ransomware operators
Learn More
FIN7 tradecraft seen in attacks against Veeam backup servers
Learn More
Magecart threat actor rolls out convincing modal forms
Learn More
Tonto Team Using Anti-Malware Related Files for DLL Side-Loading
Learn More
Chinese Alloy Taurus Updates PingPull Malware
Learn More
RokRAT Malware Distributed Through LNK Files
Learn More
CrossLock Ransomware Emerges: New GoLang-Based Malware On the Horizon
Learn More
LockBit for Mac | How Real is the Risk of macOS Ransomware?
Learn More
Play Ransomware Group Using New Custom Data-Gathering Tools
Learn More
Tracking MuddyWater’s infrastructure
Learn More
Threat Actors Rapidly Adopt Web3 IPFS Technology
Learn More
Bitter Group distributes CHM malware to Chinese institutions
Learn More
Malware Disguised as Document from Ukraine's Energoatom Delivers Havoc Demon Backdoor
Learn More
Money Ransomware: The Latest Double Extortion Group
Learn More
Threat Actor Spotlight: RagnarLocker Ransomware
Learn More
Transparent Tribe (APT36) | Pakistan-Aligned Threat Actor Expands Interest in Indian Education Sector
Learn More
CryptoClippy Speaks Portuguese
Learn More
Mac Malware MacStealer Spreads as Fake P2E Apps
Learn More
New Indicators of Compromise (IOCs) Discovered for Windows and Linux-based Backdoor Malware KEYPLUG
Learn More
Spyware vendors use 0-days and n-days against popular platforms
Learn More
Technical analysis of the Genesis Market and Middot
Learn More
APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations
Learn More
CrowdStrike Falcon Platform Detects and Prevents Active Intrusion Campaign Targeting 3CXDesktopApp Customers
Learn More
DBatLoader Actively Distributing Malwares Targeting Europea
Learn More
LimeRAT Malware Analysis: Extracting the Configuration
Learn More
Winter Vivern Uses Known Zimbra Vulnerability to Target Webmail Portals of NATO-Aligned Governments in Europe
Learn More
A look at a Magecart skimmer using the Hunter obfuscator
Learn More
Cinoshi Project and the Dark Side of Free MaaS
Learn More
New Kritec Magecart skimmer found on Magento stores
Learn More
Operation Tainted Love | Chinese APTs Target Telcos in New Attacks
Learn More
Session Cookies, Keychains, SSH Keys and More | 7 Kinds of Data Malware Steals from macOS Users
Learn More
BatLoader Continues to Abuse Google Search Ads
Learn More
CHM Malware Disguised as North Korea-related Questionnaire (Kimsuky)
Learn More
Emotet Returns, Now Adopts Binary Padding for Evasion
Learn More
South Korean Android Banking Menace – FakeCalls
Learn More
Winter Vivern | Uncovering a Wave of Global Espionage
Learn More
BlackSnake Ransomware Emerges from Chaos Ransomware’s Shadow
Learn More
DeepStreamer: Illegal Movie Streaming Platforms Hide Lucrative Ad Fraud Operation
Learn More
Malvertising In Google Search Results Delivering Stealers
Learn More
Nevada Ransomware: Yet Another Nokayawa Variant
Learn More
Prometei botnet improves modules and exhibits new capabilities in recent updates
Learn More
Redis Miner Leverages Command Line File Hosting Service
Learn More
Active hoze mining Trojan analysis
Learn More
Kaiji Botnet Resurfaces, Unmasking Ares Hacking Group?
Learn More
Lumma Stealer targets YouTubers via Spear-phishing Email
Learn More
MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT
Learn More
Beware of macOS cryptojacking malware.
Learn More
Clasiopa: New Group Targets Materials Research
Learn More
The Growing Threat of ChatGPT-Based Phishing Attacks
Learn More
Andoryu Botnet. A New Botnet Based on Socks Protocol
Learn More
Cyber attack of the group UAC-0050 using the Remcos program.
Learn More