Homepage
Open in app
Sign in
Get started
Big Data Analytics for Cyber Threat Intelligence
We prevent the adverse effects of anonymous networks and cryptocurrencies to provide healthier and safer cyberspace.
GENERAL
INTELLIGENCE
COMPANY & CULTURE
ENGINEERING
PRODUCTS
About
S2W Official Website
Follow
Latest
Unmasking CVE-2024-38178: The Silent Threat of Windows Scripting Engine
Unmasking CVE-2024-38178: The Silent Threat of Windows Scripting Engine
Author: Hosu Choi, Minyeop Choi | S2W Talon
S2W
Oct 16
Ransomware Landscape in H1 2024: Statistics and Key Issues
Ransomware Landscape in H1 2024: Statistics and Key Issues
Author: HuiSeong Yang, HyeongJun Kim, SeungHo Lee
S2W
Oct 13
[VirusBulletin 2024] The Phantom Syndicate: a hacking collective with a North Korean allegiance
[VirusBulletin 2024] The Phantom Syndicate: a hacking collective with a North Korean allegiance
Author : Olivia Lee | S2W TALON
S2W
Oct 1
[VirusBulletin 2024] Go-ing Arsenal: A Closer Look at Kimsuky’s Go Strategic Advancement
[VirusBulletin 2024] Go-ing Arsenal: A Closer Look at Kimsuky’s Go Strategic Advancement
Author: Jiho Kim | S2W TALON
S2W
Oct 1
Threat Tracking: Analysis of puNK-003’s Lilith RAT ported to AutoIt Script
Threat Tracking: Analysis of puNK-003’s Lilith RAT ported to AutoIt Script
Author: Jiho Kim | S2W TALON
S2W
Aug 21
TellYouThePass: Ransomware Attacks Exploits Critical PHP RCE Vulnerability
TellYouThePass: Ransomware Attacks Exploits Critical PHP RCE Vulnerability
Author: S2W TALON
S2W
Jul 31
[FIRSTCON 2024] Dissecting the Arsenals of LockBit
[FIRSTCON 2024] Dissecting the Arsenals of LockBit
Author: Huiseong Yang | S2W TALON
S2W
Jun 12
Trends of Telegram DaaS (DDoS as a Service) groups: their hacktivist motivations, attack techniques…
Trends of Telegram DaaS (DDoS as a Service) groups: their hacktivist motivations, attack techniques…
Author: HOTSAUCE (Threat Detection Team) | S2W TALON
S2W
Jun 7
Deep Analysis of SecretCalls, A formidable app for notorious Korean financial fraudsters (Part 2)
Deep Analysis of SecretCalls, A formidable app for notorious Korean financial fraudsters (Part 2)
Author: S2W TALON
S2W
Apr 29
SecretCalls Spotlight: A Formidable App of Notorious Korean Financial Fraudster (Part 1)
SecretCalls Spotlight: A Formidable App of Notorious Korean Financial Fraudster (Part 1)
Author: S2W TALON
S2W
Apr 29
Story of H2 2023: A Deep Dive into Data Leakage and Commerce in Chinese Telegram Channels (English…
Story of H2 2023: A Deep Dive into Data Leakage and Commerce in Chinese Telegram Channels (English…
Story of H2 2023: A Deep Dive into Data Leakage and Commerce in Chinese Telegram Channels (English ver.)
S2W
Apr 18
The XZ Backdoor issue triggered by one untrusted maintainer
The XZ Backdoor issue triggered by one untrusted maintainer
Author: Minyeop Choi, Hosu Choi, Sojun Ryu | S2W TALON
S2W
Apr 16
Ransomware Resurgence: A Deep Dive into 2023’s Threatscape and Risk Assessment
Ransomware Resurgence: A Deep Dive into 2023’s Threatscape and Risk Assessment
Author: Kyunghee Kim, Jiho Kim and Huiseong Yang | S2W TALON
S2W
Apr 9
Story of H2 2023: A Deep Dive into Data Leakage and Commerce in Chinese Telegram
Story of H2 2023: A Deep Dive into Data Leakage and Commerce in Chinese Telegram
Story of H2 2023: A Deep Dive into Data Leakage and Commerce in Chinese Telegram
S2W
Mar 28
Story of the H2 2023: Statistical Insights into Ransomware Trends and Impact on Victims (English…
Story of the H2 2023: Statistical Insights into Ransomware Trends and Impact on Victims (English…
Author: Kyunghee Kim, Jiho Kim, and Huiseong Yang | S2W TALON
S2W
Feb 21
Story of the H2 2023: In-depth Examination of Notable Ransomware Groups and Key Issues (English ver.
Story of the H2 2023: In-depth Examination of Notable Ransomware Groups and Key Issues (English ver.
Author: Jiho Kim, Huiseong Yang, and Kyunghee Kim | S2W TALON
S2W
Feb 21
RustDoor and GateDoor: A New Pair of Weapons Disguised as Legitimate Software by Suspected…
RustDoor and GateDoor: A New Pair of Weapons Disguised as Legitimate Software by Suspected…
Author: Minyeop Choi, Sojun Ryu, Sebin Lee, HuiSeong Yang | BLKSMTH
S2W
Feb 19
Kimsuky disguised as a Korean company signed with a valid certificate to distribute Troll Stealer…
Kimsuky disguised as a Korean company signed with a valid certificate to distribute Troll Stealer…
Author: Jiho Kim & Sebin Lee | BLKSMTH
S2W
Feb 7
[Region Analysis_January] Dark Web Cyber-attacks targeting MENA region(English ver.)
[Region Analysis_January] Dark Web Cyber-attacks targeting MENA region(English ver.)
Author: Sunhyung Shim, Jaehak Oh | S2W Marketing
S2W
Feb 7
[Region Analysis_January] Dark Web Cyber-attacks targeting MENA region(Korean ver.)
[Region Analysis_January] Dark Web Cyber-attacks targeting MENA region(Korean ver.)
Author: Sunhyung Shim, Jaehak Oh | S2W Marketing
S2W
Feb 7
About S2W BLOG
Latest Stories
Archive
About Medium
Terms
Privacy
Teams