Explore our blog

Here’s where we keep you up to date with the latest cyber security research, vulnerabilities, threats and solutions.

Tracking C2 Backdoors in Open Source Projects

Tracking C2 Backdoors in Open Source Projects

Throughout our investigation, we identified hard-coded C2 IP addresses embedded in Open Source Projects through multiple methods: 1. Exploits and Proof-of-Concept (PoC) code Several public PoCs included "hidden callbacks pointing to external servers, often without any...

read more
Cyber Jungle Intelligence Series

Cyber Jungle Intelligence Series

We are excited to announce the launch of the Cyber Jungle Intelligence Series, a new line of investigative threat-intelligence reports designed to navigate the dense, unpredictable, and often hostile terrain of the cyber landscape. Much like a real jungle, today's...

read more
Zerotak Launches UAE-Based Security Operations Center (SOC)

Zerotak Launches UAE-Based Security Operations Center (SOC)

We are pleased to announce the development of a Security Operations Center (SOC) in Dubai, United Arab Emirates, to offer SOC-as-a-Service (SOCaaS) solutions. This initiative aims to enhance cybersecurity capabilities in the region by providing advanced threat...

read more

Ready to get started?

Get in touch with one of our experts today to discuss your business needs.