Homepage
Open in app
Sign in
Get started
Big Data Analytics for Cyber Threat Intelligence
We prevent the adverse effects of anonymous networks and cryptocurrencies to provide healthier and safer cyberspace.
GENERAL
INTELLIGENCE
COMPANY & CULTURE
ENGINEERING
PRODUCTS
About
S2W Official Website
Follow
Latest
Detailed Analysis of TheftCalls: Impersonating Frequently Used Korean Apps
Detailed Analysis of TheftCalls: Impersonating Frequently Used Korean Apps
Author: BLKSMTH (Threat Analysis Team) & IntelOps | S2W TALON
S2W
Nov 6, 2024
Unmasking CVE-2024-38178: The Silent Threat of Windows Scripting Engine
Unmasking CVE-2024-38178: The Silent Threat of Windows Scripting Engine
Author: Hosu Choi, Minyeop Choi | S2W Talon
S2W
Oct 16, 2024
Ransomware Landscape in H1 2024: Statistics and Key Issues
Ransomware Landscape in H1 2024: Statistics and Key Issues
Author: HuiSeong Yang, HyeongJun Kim, SeungHo Lee
S2W
Oct 13, 2024
[VirusBulletin 2024] The Phantom Syndicate: a hacking collective with a North Korean allegiance
[VirusBulletin 2024] The Phantom Syndicate: a hacking collective with a North Korean allegiance
Author : Olivia Lee | S2W TALON
S2W
Oct 1, 2024
[VirusBulletin 2024] Go-ing Arsenal: A Closer Look at Kimsuky’s Go Strategic Advancement
[VirusBulletin 2024] Go-ing Arsenal: A Closer Look at Kimsuky’s Go Strategic Advancement
Author: Jiho Kim | S2W TALON
S2W
Oct 1, 2024
Threat Tracking: Analysis of puNK-003’s Lilith RAT ported to AutoIt Script
Threat Tracking: Analysis of puNK-003’s Lilith RAT ported to AutoIt Script
Author: Jiho Kim | S2W TALON
S2W
Aug 21, 2024
TellYouThePass: Ransomware Attacks Exploits Critical PHP RCE Vulnerability
TellYouThePass: Ransomware Attacks Exploits Critical PHP RCE Vulnerability
Author: S2W TALON
S2W
Jul 31, 2024
[FIRSTCON 2024] Dissecting the Arsenals of LockBit
[FIRSTCON 2024] Dissecting the Arsenals of LockBit
Author: Huiseong Yang | S2W TALON
S2W
Jun 12, 2024
Trends of Telegram DaaS (DDoS as a Service) groups: their hacktivist motivations, attack techniques…
Trends of Telegram DaaS (DDoS as a Service) groups: their hacktivist motivations, attack techniques…
Author: HOTSAUCE (Threat Detection Team) | S2W TALON
S2W
Jun 7, 2024
Deep Analysis of SecretCalls, A formidable app for notorious Korean financial fraudsters (Part 2)
Deep Analysis of SecretCalls, A formidable app for notorious Korean financial fraudsters (Part 2)
Author: S2W TALON
S2W
Apr 29, 2024
SecretCalls Spotlight: A Formidable App of Notorious Korean Financial Fraudster (Part 1)
SecretCalls Spotlight: A Formidable App of Notorious Korean Financial Fraudster (Part 1)
Author: S2W TALON
S2W
Apr 29, 2024
Story of H2 2023: A Deep Dive into Data Leakage and Commerce in Chinese Telegram Channels (English…
Story of H2 2023: A Deep Dive into Data Leakage and Commerce in Chinese Telegram Channels (English…
Story of H2 2023: A Deep Dive into Data Leakage and Commerce in Chinese Telegram Channels (English ver.)
S2W
Apr 18, 2024
The XZ Backdoor issue triggered by one untrusted maintainer
The XZ Backdoor issue triggered by one untrusted maintainer
Author: Minyeop Choi, Hosu Choi, Sojun Ryu | S2W TALON
S2W
Apr 16, 2024
Ransomware Resurgence: A Deep Dive into 2023’s Threatscape and Risk Assessment
Ransomware Resurgence: A Deep Dive into 2023’s Threatscape and Risk Assessment
Author: Kyunghee Kim, Jiho Kim and Huiseong Yang | S2W TALON
S2W
Apr 9, 2024
Story of H2 2023: A Deep Dive into Data Leakage and Commerce in Chinese Telegram
Story of H2 2023: A Deep Dive into Data Leakage and Commerce in Chinese Telegram
Story of H2 2023: A Deep Dive into Data Leakage and Commerce in Chinese Telegram
S2W
Mar 28, 2024
Story of the H2 2023: Statistical Insights into Ransomware Trends and Impact on Victims (English…
Story of the H2 2023: Statistical Insights into Ransomware Trends and Impact on Victims (English…
Author: Kyunghee Kim, Jiho Kim, and Huiseong Yang | S2W TALON
S2W
Feb 21, 2024
Story of the H2 2023: In-depth Examination of Notable Ransomware Groups and Key Issues (English ver.
Story of the H2 2023: In-depth Examination of Notable Ransomware Groups and Key Issues (English ver.
Author: Jiho Kim, Huiseong Yang, and Kyunghee Kim | S2W TALON
S2W
Feb 21, 2024
RustDoor and GateDoor: A New Pair of Weapons Disguised as Legitimate Software by Suspected…
RustDoor and GateDoor: A New Pair of Weapons Disguised as Legitimate Software by Suspected…
Author: Minyeop Choi, Sojun Ryu, Sebin Lee, HuiSeong Yang | BLKSMTH
S2W
Feb 19, 2024
Kimsuky disguised as a Korean company signed with a valid certificate to distribute Troll Stealer…
Kimsuky disguised as a Korean company signed with a valid certificate to distribute Troll Stealer…
Author: Jiho Kim & Sebin Lee | BLKSMTH
S2W
Feb 7, 2024
[Region Analysis_January] Dark Web Cyber-attacks targeting MENA region(English ver.)
[Region Analysis_January] Dark Web Cyber-attacks targeting MENA region(English ver.)
Author: Sunhyung Shim, Jaehak Oh | S2W Marketing
S2W
Feb 7, 2024
About S2W BLOG
Latest Stories
Archive
About Medium
Terms
Privacy
Teams