Рус
Products and services
Industries
Expertise
Threat Zone 2025: The Other Side
#research
#analytics
#attacks
#leaks
Using insights into vulnerabilities and adversary techniques to prevent attacks
#analytics
#tools
#attacks
Materials
Technical articles
Business continuity management
Threat Zone
About us
+7 499 110-25-34
+44 20 3808 3511
info@bi.zone
cert@bi.zone
About us
News
Contact us
Report incident
Technical articles
Using insights into vulnerabilities and adversary techniques to prevent attacks
#analytics
#attacks
#tools
We explore how threat intelligence helps proactively limit threat actor capabilities
Unholy trinity: werewolves target law enforcers
#phishing
#research
#threatactors
#attacks
Forbidden Hyena adopts BlackReaperRAT in AI-powered campaigns
#phishing
#research
#attacks
Utilizing adversary infrastructure insights to derail attacks
#analytics
#tools
#attacks
Approaching cyclone: Vortex Werewolf attacks Russia
#phishing
#research
#attacks
Adversaries exploit CVE‑2025‑55182 to attack Russian companies
#analytics
#research
#attacks
#vulnerabilities
Arcane Werewolf revamps its arsenal with Loki 2.1 implant
#analytics
#research
#threatactors
#attacks
Leveraging darknet to predict attacks
#analytics
#tools
#attacks
Mapping and leveraging cyber threat landscape to predict attacks
#analytics
#tools
#attacks
More articles
Popular articles
Rainbow Hyena strikes again: new backdoor and shift in tactics
#analytics
#attacks
#phishing
#threatactors
Zooming in on CVE‑2024‑7965
#analytics
#vulnerabilities
Stone Wolf employs Meduza Stealer to hack Russian companies
#analytics
#attacks
#research
#threatactors
Breaking down Windows critical vulnerability CVE‑2024‑38063
#analytics
#attacks
#vulnerabilities
We use cookies to personalize the services and the convenience of website users. You can prevent cookies from being stored in your browser settings. By using this website, you confirm your consent to the Privacy Policy.