Threat Intelligence & Research
Original research, PreBreach intelligence insights, and security best practices from our cybersecurity experts.

GraphQL Phishing: Gmail-Themed Credential Harvesting Behind Cloudflare

When Malware Wears a Brand: Zoom Lure → Fake Microsoft Marketplace → Remote Access via Zoho
A new attack chain uses brand impersonation and legitimate tools to bypass detection—turning everyday collaboration into a covert entry point.

Operation Gauloises: How One Operator Bridges the DarkWeb to the Levant via Whish Money
Technical Analysis of DarkWeb Liquidity Off-Ramping via Levantine Fintech

Device Authentication Phishing: Account Takeover via Microsoft Device Code Flow
How attackers exploit Microsoft device code flow to bypass MFA and gain persistent account access

Autumn Dragon: China-nexus APT Group Targets South East Asia

Inside “SalatStealer” — Reverse Engineering a YouTube Bitcoin Brute Tool Malware

Stop Account Takeover Before It Starts: Introducing PreBreach Identity Guard

Get Our Report
Nigerian Hacker Exposed: AI, Infrastructure, and Love
DarkArmor collected and analyzed over 3000 screenshots from a Nigerian cybercriminal’s desktop, and what we uncovered goes far beyond the outdated image of “419 scams”. Learn how automation helped him launch attacks at scale.
DownloadSign up for early access
Advanced phishing and malware forensics to protect identity asset ownership before your organizations compromised credentials reach the dark web
Get proactive, prebreach intelligence
Be an early adopter with enhanced support and input on feature development
Limited time early adopter pricing
Get an edge over your competition