Remote-Access And RMM

Top 5 Remote-Access And RMM Tools Most Abused By Threat Actors 

Remote monitoring and management (RMM) tools are a go-to for IT teams, but that same power makes them a favorite trick up attackers' sleeves, too. In the first half of 2025, ANY.RUN analysts reviewed...
Phishing Kit Attacks 

Tycoon2FA, EvilProxy, Sneaky2FA: How To Defend Against These Phishing Kit Attacks 

Phishing kits are evolving fast. Threat actors behind toolkits like Tycoon2FA, EvilProxy, and Sneaky2FA are getting smarter, setting up infrastructure that bypasses 2FA and mimics trusted platforms like Microsoft 365 and Cloudflare to steal...
BRAODO Stealer

New BRAODO Stealer Campaign Abuses GitHub To Host Payloads And Evade Detection 

Security researchers at ANY.RUN have uncovered a new malware campaign delivering the BRAODO Stealer, which relies on public GitHub repositories to host and stage its payloads. This campaign employs multiple evasion techniques and scripting layers...
Trends In Phishing Attacks

5 New Trends In Phishing Attacks On Businesses – Must Aware Threats

Phishing remains one of the most effective ways attackers infiltrate corporate environments. Today’s phishing campaigns are no longer just poorly written emails with obvious red flags. They’re sophisticated, well-disguised, and tailored to exploit trust...
Fast Incident Response

How to Detect Threats Early For Fast Incident Response: 3 Examples 

Security Operations Center (SOC) teams are now facing an increasingly complex challenge: identifying and responding to security incidents before they can cause significant damage. The key to effective incident response is not just detecting...
Evasion Techniques In Phishing Attacks

Top 3 Evasion Techniques In Phishing Attacks: Real Examples Inside 

Phishing attacks aren’t what they used to be. Hackers no longer rely on crude misspellings or sketchy email addresses. Instead, they use clever tricks to dodge detection tools and fool even cautious users.   Let’s break...
Free vs. Paid Threat Intelligence Feeds

Free vs. Paid Threat Intelligence Feeds: What SOC Managers Need To Know

In today’s dynamic threat landscape, Threat Intelligence (TI) feeds have become a must-have for Security Operations Centers (SOCs). Whether free or paid, they offer vital insights helping teams identify threats, develop detection rules, enrich alerts, and accelerate incident...
SOC Metrics

3 SOC Metrics Improved With Sandbox Analysis 

SOC teams are flooded with alerts, but what really matters is how quickly they can detect, investigate, and respond. When traditional tools fall short, sandbox analysis offers a clear view into real threat behavior,...
Threat Intelligence Data

How To Use Threat Intelligence Data From 15,000 Companies To Defend Yours 

Threat intelligence is the cornerstone of proactive cyber defense, providing context to security events to prioritize response efforts. It's about turning raw data into strategic insights that can be used to fortify network defenses...
Security Operations With Malware Sandbox

3 Ways MSSPs Can Boost Security Operations With Malware Sandbox

Managed Security Service Providers (MSSPs) face constant pressure to deliver accurate detection, fast response, and efficient training without overloading their teams. With cyberattacks becoming more complex and evasive, the right tools can make all...

Exclusive Stories