News

80 Results / Page 1 of 9

Background

todayJuly 12, 2025

  • 15
close

News Mjolnir Security

The Mjolnir Security Threat Report: Unearthing Uncharted Artifacts in Windows 11

Drawing on insights from 582 full-spectrum DFIR investigations, Mjolnir Security reveals the uncharted forensic landscape of Windows 11. This intelligence briefing moves beyond legacy artifacts to expose the critical evidence sources modern adversaries leverage, including the Windows Subsystem for Android (WSA), covert channels in Microsoft Teams, and the persistent ledger ...

todayJuly 6, 2025

  • 86
close

News + Threat Intelligence + Global news + Skuggaheimar Mjolnir Security

The Anthropology of Salt Typhoon: Deconstructing a Premier Chinese State-Sponsored Espionage Actor

A deep-dive anthropological analysis of Salt Typhoon, the premier Chinese state-sponsored cyber espionage group targeting global telecommunications and government sectors. This report deconstructs their identity, patient “Living off the Land” tactics, and advanced malware like the Demodex rootkit. Learn how Mjolnir Security’s proactive services, from Threat Hunting to Digital Forensics, ...

todayJune 24, 2025

  • 332
close

News + Threat Intelligence + Skuggaheimar Mjolnir Security

The Asymmetric Battlefield: An Anthropological and Geopolitical Analysis of Iranian Cyber Threats to North American Critical Infrastructure

A deep-dive analysis reveals that Iranian state-sponsored cyber threats to U.S. and Canadian critical infrastructure are not random, but a core component of a sophisticated geopolitical strategy. Rooted in a doctrine of asymmetric retaliation born from the Stuxnet attack, groups like Charming Kitten, APT33, and APT34 operate as instruments of ...

todayJune 23, 2025

  • 40
close

oil and gas + Skuggaheimar + News + APT + Threat Intelligence Mjolnir Security

Countering Advanced Persistent Threats: Mjolnir Security’s Approach

Introduction In an increasingly interconnected digital world, Advanced Persistent Threat (APT) groups pose a sophisticated and relentless challenge to organizations globally. These highly skilled adversaries execute sustained, covert cyberattacks with long-term objectives such as espionage, intellectual property theft, or critical infrastructure disruption. Traditional security measures often fall short against their ...

todayJune 21, 2025

  • 472
close

News + APT + Threat Intelligence + Skuggaheimar Mjolnir Security

An Actionable Threat Analysis of Scattered Spider and Dragon Force

Executive Threat Summary 1.1. Overview of the Symbiotic Threat The modern cyber threat landscape is increasingly characterized by specialization and collaboration, a trend exemplified by the potent, symbiotic relationship between the Scattered Spider initial access broker and the Dragon Force Ransomware-as-a-Service (RaaS) operation. These are not two disparate threats but ...

todayJune 21, 2025

  • 51
close

News + Skuggaheimar Mjolnir Security

Navigating the Storm: Top Cyber Threats of H1 2025 and How Your Business Can Stay Secure

The dawn of 2025 brings with it a cyber battlefield characterized by an accelerating pace of innovation – not just from defenders, but critically, from those who seek to exploit vulnerabilities. Cybercrime has evolved into a highly efficient, business-like endeavor, with adversaries operating with unprecedented speed, sophistication, and scale. Organizations ...

todayJune 7, 2025

  • 24
close

News Mjolnir Security

Cybercriminals’ New Playground: How Native Windows Tools are Turned Against North American Businesses

In the ever-evolving landscape of cybersecurity, attackers are increasingly adopting a “less is more” approach. Instead of deploying sophisticated, custom-built malware, they are turning to the very tools that keep your systems running. A recent analysis has shed light on this alarming trend, and the findings are a wake-up call ...

todayJune 7, 2025

  • 28
close

News + Skuggaheimar Mjolnir Security

The Silent Siege: Unmasking the Escalating Cyber Threats to Operational Technology

Introduction The hum of machinery, the flow of resources, the critical functions that underpin our daily lives – all increasingly orchestrated by Operational Technology (OT). But this interconnectedness, while driving efficiency, has opened a new frontier for cyber adversaries. OT environments, once considered isolated, are now prime targets. This isn’t ...