Data Breach Resources Detecting ClickFix Malvertising in Enterprise Environments This is Part 3 of a three-part series analyzing a sophisticated ClickFix malvertising campaign. In…Cyber Centaurs TeamMarch 13, 2026
Data Breach Resources Deconstructing the ClickFix Infection Chain Part 2 – Loader Obfuscation and Stealth Persistence This is Part 2 of a three-part series analyzing a sophisticated ClickFix malvertising campaign. In…Cyber Centaurs TeamFebruary 11, 2026
Data Breach Resources Unmasking the ClickFix Malvertising Infection Chain part1 This is Part 1 of a three-part series analyzing a sophisticated ClickFix malvertising campaign. In…Cyber Centaurs TeamFebruary 9, 2026
Data Breach Resources When Ransomware Makes a Mistake Inside INC Ransomware’s Backup Infrastructure This article documents how Cyber Centaurs identified, validated, and safely accessed attacker-controlled data repositories operated…Cyber Centaurs TeamJanuary 22, 2026
Data Breach Resources Infiltration into the INC Ransomware Group’s Infrastructure In a world where technology news are dominated by stories of ransomware attacks and data…Cyber Centaurs TeamNovember 10, 2025
Data Breach Resources RedNovember’s Tactics and Tradecraft Over the past year, a Chinese-linked threat actor known as RedNovember has emerged as a…Cyber Centaurs TeamOctober 4, 2025
Data Breach Resources Threat Actors’ Obsession with Veeam Backups Threat actors are now deliberately targeting Veeam backup infrastructure to exfiltrate sensitive data before executing…Cyber Centaurs TeamSeptember 11, 2025
Data Breach Resources Supply Chain Attacks in Healthcare Are a Growing Cybersecurity Threat Supply Chain Attacks in Healthcare Are a Growing Cybersecurity Threat As supply Chain Attacks are…Cyber Centaurs TeamMay 23, 2025
Data Breach Resources Guarding Against Midnight Blizzard’s New RDP Tactics As cyber threat actors continually refine their techniques, state-sponsored groups are pushing boundaries to infiltrate…Cyber Centaurs TeamNovember 26, 2024
Digital Forensics Resources The Truth About Deleted Data and Modern Technology Across the field of digital forensics, one myth persists with remarkable tenacity: the belief that…Cyber Centaurs TeamNovember 12, 2024