Mjolnir Security

114 Results / Page 1 of 13

Background

todayJuly 12, 2025

  • 15
close

News Mjolnir Security

The Mjolnir Security Threat Report: Unearthing Uncharted Artifacts in Windows 11

Drawing on insights from 582 full-spectrum DFIR investigations, Mjolnir Security reveals the uncharted forensic landscape of Windows 11. This intelligence briefing moves beyond legacy artifacts to expose the critical evidence sources modern adversaries leverage, including the Windows Subsystem for Android (WSA), covert channels in Microsoft Teams, and the persistent ledger ...

todayJuly 6, 2025

  • 86
close

News + Threat Intelligence + Global news + Skuggaheimar Mjolnir Security

The Anthropology of Salt Typhoon: Deconstructing a Premier Chinese State-Sponsored Espionage Actor

A deep-dive anthropological analysis of Salt Typhoon, the premier Chinese state-sponsored cyber espionage group targeting global telecommunications and government sectors. This report deconstructs their identity, patient “Living off the Land” tactics, and advanced malware like the Demodex rootkit. Learn how Mjolnir Security’s proactive services, from Threat Hunting to Digital Forensics, ...

todayJune 24, 2025

  • 332
close

Threat Intelligence + Skuggaheimar + News Mjolnir Security

The Asymmetric Battlefield: An Anthropological and Geopolitical Analysis of Iranian Cyber Threats to North American Critical Infrastructure

A deep-dive analysis reveals that Iranian state-sponsored cyber threats to U.S. and Canadian critical infrastructure are not random, but a core component of a sophisticated geopolitical strategy. Rooted in a doctrine of asymmetric retaliation born from the Stuxnet attack, groups like Charming Kitten, APT33, and APT34 operate as instruments of ...

todayJune 23, 2025

  • 40
close

News + APT + Threat Intelligence + oil and gas + Skuggaheimar Mjolnir Security

Countering Advanced Persistent Threats: Mjolnir Security’s Approach

Introduction In an increasingly interconnected digital world, Advanced Persistent Threat (APT) groups pose a sophisticated and relentless challenge to organizations globally. These highly skilled adversaries execute sustained, covert cyberattacks with long-term objectives such as espionage, intellectual property theft, or critical infrastructure disruption. Traditional security measures often fall short against their ...

todayJune 21, 2025

  • 473
close

News + APT + Threat Intelligence + Skuggaheimar Mjolnir Security

An Actionable Threat Analysis of Scattered Spider and Dragon Force

Executive Threat Summary 1.1. Overview of the Symbiotic Threat The modern cyber threat landscape is increasingly characterized by specialization and collaboration, a trend exemplified by the potent, symbiotic relationship between the Scattered Spider initial access broker and the Dragon Force Ransomware-as-a-Service (RaaS) operation. These are not two disparate threats but ...

todayJune 21, 2025

  • 51
close

News + Skuggaheimar Mjolnir Security

Navigating the Storm: Top Cyber Threats of H1 2025 and How Your Business Can Stay Secure

The dawn of 2025 brings with it a cyber battlefield characterized by an accelerating pace of innovation – not just from defenders, but critically, from those who seek to exploit vulnerabilities. Cybercrime has evolved into a highly efficient, business-like endeavor, with adversaries operating with unprecedented speed, sophistication, and scale. Organizations ...

todayJune 17, 2025

  • 28
close

Skuggaheimar + Threat Intelligence Mjolnir Security

Anatomy of a Threat: APT31 and the Global Espionage Campaign

Dive into our deep analysis of APT31 (also known as Zirconium), a sophisticated nation-state actor conducting persistent cyber espionage campaigns against Canada. This threat intelligence report breaks down the group’s tactics, from stealthy spear-phishing to advanced malware. Learn critical cyber defense strategies to protect your organization from this advanced persistent ...

todayJune 10, 2025

  • 24
close

Industry Mjolnir Security

Mining

Cybersecurity for Mining: Hardening the Core of Extraction The mining sector is fundamental to global industry, but its unique operational environments present formidable cybersecurity challenges. Modern mining relies heavily on interconnected Industrial Control Systems (ICS), vast networks of IoT sensors, remote operations, and highly specialized heavy machinery. A cyberattack here ...