Resources
Updates about Protos Labs and helpful guides on cyber security and cyber insurance.
Analytic Reports
Evolving Malware Attacks: The ChromeLoader Shampoo Campaign
An analysis of the latest malware threats, covering the ChromeLoader campaign from March 2023, highlights the distribution method and behaviour of the Shampoo browser extension, emphasising on the persistence and complexity of removing the ChromeLoader Shampoo malware.
Read more
Analytic Reports
Detriments of Ransomware Threats: BlackCat’s New Attack Vector
An analysis of the latest ransomware attack, highlighting the infection vector, attack chain, tools an d techniques used by the threat actors.
Read more
Analytic Reports
Detriments of Ransomware Threats: The Big Head Deception
An analysis on the Big Head ransomware, a recently emerged strain that spreads through malvertising campaigns promoting fake Windows updates and Microsoft Word installers.
Read more
Analytic Reports
Evolving Malware Attacks: The LokiBot Trojan
An analysis of a recent malware campaign involving Microsoft Word documents exploiting known remote code execution flaws to deliver the LokiBot malware.
Read more
Analytic Reports
Evolving Malware Attacks: The DeliveryCheck Backdoor
An analysis of a recent cyber espionage campaign by the Russian state-sponsored Turla hacking group, also known as Secret Blizzard, KRYPTON, and UAC-0003.
Read more
Analytic Reports
Detriments of Ransomware Threats: BlackByte 2.0
Recent investigation into BlackByte 2.0 ransomware reveals a concerning trend of rapid attacks with devastating consequences.
Read more
News
Protos Labs presents Cyber Risk Solutions at Lloyd’s Lab Demo Day
On 6 Dec 2023, Joel Lee, CEO of Protos Labs presented our cyber risk analytics solution for insurers at the Lloyd's Lab Demo Day,
Read more
Analytic Reports
The Perils of Phishing Attacks: A Case Study on EvilProxy
EvilProxy, a popular phishing-as-a-service platform, is at the forefront of a surge in cloud account takeover incidents over the past five months.
Read more
Analytic Reports
Evolving Malware Attacks: Covert Attacks through LOLBAS
The evolving landscape of cyber threats introduces an emerging peril through the expansion of Living-off-the-Land Binaries and Scripts (LOLBAS).
Read more
Analytic Reports
Exploitation of Vulnerabilities: A Cryptocurrency & Trading Nightmare
A recent security incident involving a WinRAR zero-day vulnerability, tracked as CVE-2023-38831, has raised significant concerns.
Read more
Analytic Reports
The Perils of Phishing Attacks: MalDoc in PDF
Japan's computer emergency response team (JPCERT) has discovered an innovative phishing attack technique known as the 'MalDoc in PDF' attack.
Read more
Analytic Reports
The Perils of Phishing Attacks: Advanced W3LL Kit
The threat actor known as W3LL has developed an advanced phishing kit capable of bypassing multi-factor authentication (MFA).
Read more
Analytic Reports
Exploitation of Vulnerabilities: Malicious Window’s ThemeBleed
A critical security vulnerability, known as CVE-2023-38146 or ThemeBleed is a high-severity security flaw affecting Windows systems.
Read more
Analytic Reports
Malicious Misconfiguration: AMBERSQUID Cryptojacking
A novel cloud-native cryptojacking operation, codenamed AMBERSQUID, has been targeting uncommon Amazon Web Services (AWS) offerings.
Read more
Analytic Reports
Evolving Malware Attacks: Bing Chat Compromised
Malicious advertisements are now being injected into Microsoft's AI-powered Bing Chat responses, promoting fake download sites that distribute malware.
Read more
Analytic Reports
Qualitative vs Quantitative: Methods of Cyber Risk
Is one more effective than the other? In part one of a new CRQ series, we take a closer look at the outcomes of each approach.
Read more