company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

design

Threat Research

Explore Secure Blink's Threat Research. In-depth analysis on ransomware, malware families, and APT groups. Stay ahead with actionable insights.
logo
design
Loading...

Fileless Malware

MaaS

RevC2, More_eggs Lite & PSLoramyra: Insights into Advanced Fileless Malware

Explore detailed analysis of advanced fileless malware RevC2, More_eggs Lite, and PSLoramyra. Understand their tactics, IOCs, and protection strategies. ...

  06-Dec-2024
  24 min read
Loading...

Encryptor

Interlock: New Cross-Platform Threat Targets Critical Infrastructure with Double...

Interlock ransomware is a cross-platform threat targeting critical infrastructure using double-extortion tactics. Learn about its methods and impacts...

  19-Nov-2024
  10 min read
Loading...

Typosquatting

Supply Chain

Fabrice Malware: Python Typosquatting Targeting AWS via Supply Chain on Linux & ...

Explore Fabrice malware: a Python typosquatting supply chain attack targeting AWS credentials across Linux & Windows via the compromised fabric library......

  11-Nov-2024
  13 min read
Loading...

Trojan

ToxicPanda

Banking

ToxicPanda: New Android Banking Trojan Targeting Multiple Regions

Explore ToxicPanda, a new banking trojan spreading from Asia to Europe and LATAM. Learn how it exploits Android devices for on-device fraud and RAT capabilities...

  06-Nov-2024
  12 min read
Loading...

Android

NECRO

Necro Trojan’s Return: Infiltrating Google Play to Target Android Users

Explore the resurgence of the Necro Trojan, its infiltration of Google Play, and how it uses advanced steganography & obfuscation to infect Android a...

  25-Sep-2024
  12 min read
Loading...

Malware

Voldemort Malware: Hybrid Espionage Exploits Google Sheets & Trusted Platforms

Voldemort Malware exploits Google Sheets for espionage, blending cybercrime with trusted platforms in a sophisticated hybrid campaign targeting global organizations… ...

  23-Sep-2024
  6 min read
Loading...

Android

RAT

Encryption

Rafel RAT Targets Android Phones in Sophisticated Ransomware Campaigns

Explore how Rafel RAT exploits vulnerabilities in outdated Android devices, orchestrating sophisticated ransomware attacks globally.

  24-Jun-2024
  7 min read
Loading...

Cyberespionage

APT

New Espionage Group Unfading Sea Haze Targets South China Sea Nations

Unfading Sea Haze, a new cyberespionage group, targets South China Sea nations

  11-Jun-2024
  8 min read
Loading...

Malware

Latrodectus Malware: Advanced Successor to IcedID Unveiled

Discover the sophisticated Latrodectus malware, the advanced successor to IcedID, in our latest research. Explore its capabilities, evolution, and technical analysis. ...

  23-May-2024
  7 min read
Loading...

ransomware

StopCrypt Resurgence: A Multi-Layered Deceptive Ransomware Strain

StopCrypt ransomware is back with a vengeance! This analysis dives into its multi-stage attack methods for a deeper understanding of this deceptive threat...

  30-Apr-2024
  3 min read