cyber-intrusion
Dark AI tools: How profitable are they in the...
Research & Threat Intel
KrakenLabs have observed key actors and groups the dark artificial intelligence ecosystem, exploring the business of selling and developing artificial...
mitre framework
Using Mitre Att&CK with threat intelligence to improve Vulnerability...
Research & Threat Intel
Threat actors are constantly evolving their tactics and techniques in the attack lifecycle and infiltrate company infrastructure. While most organizations...
cyber-intrusion
Minimizing intrusion detection time with cyber threat intelligence
Research & Threat Intel
In an era defined by pervasive connectivity, businesses of all sizes find themselves grappling with an escalating threat of cyber-attacks....
ICS attack classifications
ICS attack classifications: differentiating between cyberwarfare, cyberterrorism, and hacktivism
Research & Threat Intel
In this article, we build the bridge between the conceptual field of International Relations and the terminology employed by cybersecurity...
KrakenLabs’ threat actor naming conventions
Research & Threat Intel
KrakenLabs has developed a new naming convention that uses poisonous plants to represent the origin and criminal activities of threat...