Throughout our investigation, we identified hard-coded C2 IP addresses embedded in Open Source Projects through multiple methods: 1. Exploits and Proof-of-Concept (PoC) code Several public PoCs included "hidden callbacks pointing to external servers, often without any...
Explore our blog
Here’s where we keep you up to date with the latest cyber security research, vulnerabilities, threats and solutions.
Cyber Jungle Intelligence Series
We are excited to announce the launch of the Cyber Jungle Intelligence Series, a new line of investigative threat-intelligence reports designed to navigate the dense, unpredictable, and often hostile terrain of the cyber landscape. Much like a real jungle, today's...
Zerotak Launches UAE-Based Security Operations Center (SOC)
We are pleased to announce the development of a Security Operations Center (SOC) in Dubai, United Arab Emirates, to offer SOC-as-a-Service (SOCaaS) solutions. This initiative aims to enhance cybersecurity capabilities in the region by providing advanced threat...
Ready to get started?
Get in touch with one of our experts today to discuss your business needs.
