Gain Visibility to
Immediate Threats
as They Emerge

Our way to help keep organizations
aware and protected

Get info and remediation
guidance on new threats –
as they emerge!

01 New payloads and attacks show
up in the wild every day
02 The Cymulate Research Lab catches and analyzes
threats immediately after they are launched by
cybercriminals and malicious hackers
03 Receive a daily email with important
information and simple remediation tips
04 Contact us at anytime to learn how you
can validate your defenses against them

Sign Up For Threat Alerts

Loading...
Threats Icon

Oct 14, 2021

BlackByte Ransomware Virus

BlackByte is ransomware that infects Windows computers for the purpose of blackmailing or extorting money...

Threats Icon

Oct 14, 2021

Israel on heightened alert after hospital hit...

Hillel Yaffe resorts to logging admissions with pen and paper while being unable to conduct...

Threats Icon

Oct 13, 2021

FIN12 Ransomware Threat Actor Aggressively Pursued Healthcare...

IN12, an aggressive, financially motivated threat actor behind prolific ransomware attacks since at least October...

Threats Icon

Oct 11, 2021

Actors Target Huawei Cloud Using Upgraded Linux...

TrendMicro have recently noticed another Linux threat evolution that targets relatively new cloud service providers...

Threats Icon

Oct 07, 2021

GhostEmperor – From ProxyLogon to kernel mode

Analysts noticed a recurring cluster of activity that appeared in several distinct compromised networks. This...

Threats Icon

Oct 06, 2021

Atom Silo ransomware actors use Confluence exploit

A new ransomware operator uses stealthy techniques, but borrows heavily from other players. Sophos' MTR...

Threats Icon

Oct 05, 2021

Financially motivated actor breaks certificate parsing to...

Attackers created malformed code signatures that are treated as valid by Windows but are not...

Threats Icon

Oct 04, 2021

Fake Installers Drop Malware and Open Doors...

One way that attackers trick users is by luring them with unauthorized apps or installers...

Threats Icon

Oct 04, 2021

FinSpy – unseen findings

FinSpy, also known as FinFisher or Wingbird, is an infamous surveillance toolset. Analysts began detecting...

Threats Icon

Sep 27, 2021

FamousSparrow: A suspicious hotel guest

Yet another APT group that exploited the ProxyLogon vulnerability in March 2021 ESET researchers have...

Threats Icon

Sep 23, 2021

Cryptominer z0Miner Uses Newly Discovered Vulnerability CVE-2021-26084...

The cryptomining trojan z0Miner has been taking advantage of the Atlassian's Confluence remote code execution...

Threats Icon

Sep 22, 2021

TinyTurla – Secret backdoor on victim machines

Russian state-sponsored hackers known as the Turla APT group have been using new malware over...

Threats Icon

Sep 19, 2021

No Longer Just Theory-Linux Executables Deployed As...

Researchers recently identified several malicious files that were written primarily in Python and compiled in...

Threats Icon

Sep 14, 2021

Stolen Images Evidence Campaign Continues Pushing BazarLoader...

Analysts have been focusing on BazarLoader as it comes through various distribution channels. One such...

Threats Icon

Sep 14, 2021

Grayfly: Chinese Threat Actor

Recent campaigns involved exploits against Exchange and MySQL servers. Group has heavy focus on telecoms...