company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

design

Threat Research

Explore Secure Blink's Threat Research. In-depth analysis on ransomware, malware families, and APT groups. Stay ahead with actionable insights.
logo
design
Loading...

WordPress

Malware

Balada Injector: A Massive Ongoing WordPress Malware Campaign

Balada Injector: A Comprehensive Threat Research on Ongoing WordPress Malware Campaign. Learn about the code scripts, IoCs, and in-depth technical analysis......

  24-Apr-2023
  3 min read
Loading...

Ransomware

Dark Power Ransomware: New Double Extortion Tactics

Discover the new Dark Power ransomware threat and learn how to protect your systems. Our threat research reveals its origin, behavior, and IoCs...

  27-Mar-2023
  7 min read
Loading...

IoT Devices

Botnet

Mirai

Mirai Botnet: How IoT Devices Almost Brought Down The Internet

Learn about the MIRAi botnet and its devastating impact on IoT devices. Understand how to protect your devices and networks from this dangerous malware....

  25-Mar-2023
  3 min read
Loading...

Watering Hole

Backdoor

North Korea

WhiskerSpy: New Backdoor Spread via Watering Hole Attack by Earth Kitsune

WhiskerSpy: A new backdoor malware disguised as browser extensions propagating via Watering Hole attack targeting users in Russia, Belarus, & Ukraine...

  23-Feb-2023
  4 min read
Loading...

Linux

BOLDMOVE: New Linux Malware Discovered in China-based Espionage Targeting FortiO...

BOLDMOVE is a new Linux-based malware discovered in a China-based cyber espionage campaign that targets FortiOS devices. The malware is used to maintain persistence on exploited devices by patching the FortiOS logging processes and disabling logging altogether....

  25-Jan-2023
  6 min read
Loading...

Malware

Shagle

Telegram

StrongPity APT After Android Users with Trojanized Telegram App

Learn about the StrongPity APT group's latest espionage campaign targeting Android users with a trojanized Telegram app disguised as the Shagle chat app......

  19-Jan-2023
  7 min read
Loading...

Malware

SSH

MCCrash Malware: A Cross-Platform Botnet Targeting SSH-Enabled Devices

Analysis of MCCrash cross-platform botnet that targets Windows & Linux devices, as well as IoT devices, via insecure SSH settings. It launches DDoS attacks against private Minecraft servers... ...

  23-Dec-2022
  6 min read
Loading...

Malware

Infostealer

Ducklogs

Ducklogs: A Malware-as-a-Service Comes With Multifold Functionalities

Ducklogs Malware-as-a-Service offers functionality to steal & exfiltrate user data from compromised systems…

  17-Dec-2022
  3 min read
Loading...

Discord

Ransomware

AxLocker: A new wave of ransomware attacks targeting Discord Servers

Discord servers credentials are being exploited involving newly emerged ransomware families out of which AxLocker…

  21-Nov-2022
  4 min read
Loading...

Dropper

BOMB

Malware

BOMB: A Dropper-Like Malware Actively Spreading In Disguise of Cracks

BOMB, a dropper malware concealed as crack actively circulated following it's dormancy deployed over the targeted system…

  16-Nov-2022
  3 min read