
CYFIRMA Research
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
Episodes
225 episodes
CYFIRMA Research- Tracking Ransomware: May 2025
Stay ahead of evolving ransomware threats with CYFIRMA’s May 2025 Ransomware Report.May witnessed a 15.95% spike in ransomware attacks compared to April, with 545 incidents logged globally. New actors like SafePay and SilentRansomGroup ...
•
4:04

CYFIRMA Research: Understanding CyberEye RAT Builder- Capabilities and Implications
CYFIRMA’s latest research report analyses a stealthy Windows-based malware known as CyberEye, which is posing a significant threat across systems by offering attackers full remote control through a Telegram Bot API. Once executed, it silently h...
•
5:30

CYFIRMA Research: Ukraine's Attack on Russia's Strategic Air Force- Live Feed from Revolution in Military Affairs
Ukraine’s daring drone strike reshapes warfare! CYFIRMA’s research team examines how cheap tech took on Russia’s nuclear air force and what it means for global militaries. Link to the Reseach Report: https://www.cyfirma.co...
•
8:35

CYFIRMA Research: DuplexSpy RAT- A Stealthy Windows Malware Enabling Full Remote Control and Surveillance
A highly modular Windows Remote Access Trojan (RAT), DuplexSpy, written in C#, has surfaced with advanced surveillance and system control capabilities.Features include keylogging, remote shell access, screen & webcam spying, audio e...
•
6:14

CYFIRMA Research: Firewalls and Frontlines- The India-Pakistan Cyber Battlefield Crisis
As tensions between India and Pakistan escalated in early 2025, the conflict spilled into cyberspace. In the wake of the April 22nd Kashmir attack and India’s Operation Sindoor, dozens of hacktivist groups launched a wave of digital assaults — ...
•
6:47

CYFIRMA Research- Versa Concerto: Understanding and Mitigating CVE-2025-34027
Critical Alert: CVE-2025-34027 – Authentication Bypass + RCE in Versa Concerto! Organizations using Versa Concerto for network orchestration must take immediate action. This newly disclosed vulnerability allows unauthenticated a...
•
4:27

CYFIRMA Research- Lyrix Ransomware
A new ransomware! Lyrix Ransomware targets Windows systems, encrypting files and appending random 10-character extensions. Victims receive a README.txt ransom note demanding payment, threatening to leak stolen data. Strengthen robu...
•
6:29

CYFIRMA Research- While Trump Disrupts World Order China Prepares for War Over Taiwan
Read CYFIRMA’s latest geo-political analysis, regarding Trump’s continued disruption of the world order, calling U.S. alliances into question while an emboldened China prepares for war over Taiwan. Link to the Research Report: ht...
•
11:29

CYFIRMA Research: GhostSpy- Web-Based Android RAT
A high-risk Android malware poses a serious threat by targeting banking apps, bypassing screenshot protections through UI reconstruction to steal sensitive financial data. It records live screen activity, captures video, and audio in real time,...
•
6:08

CYFIRMA Research- Tracking Ransomware: April 2025
Stay ahead of evolving ransomware threats with CYFIRMA’s April 2025 Ransomware Report.Last month revealed shifting dynamics—Qilin surged by 71%, while Play and DragonForce increased by 75% and 25% respectively. Despite a 29% drop in tot...
•
7:39

CYFIRMA Research- PupkinStealer : A .NET-Based Info-Stealer
CYFIRMA’s latest threat report reveals the workings of PupkinStealer, a .NET-based information stealer designed to extract a focused set of sensitive data from victim systems. Targeting browser credentials, desktop files, Telegram and Discord s...
•
4:33

CYFIRMA Research- EXPLAINER: THE ALGERIA / MOROCCO TENSIONS
Geopolitical tensions between Algeria and Morocco have reignited over the Western Sahara issue. Hacktivist groups have exacerbated the situation by targeting each other’s critical infrastructure. Algerian hacktivists claimed to have breached Mo...
•
7:45

CYFIRMA Research- Gunra Ransomware
A new threat is on the rise - Gunra Ransomware. This sophisticated ransomware not only encrypts files but also exfiltrates sensitive data, threatening to leak the data unless the ransom is paid.Read the latest report from the CYFIRMA re...
•
9:22

CYFIRMA Research- US MANUFACTURING RELOCATION AND THREATS
Donald Trump’s new tariff promises to revive American manufacturing, but evidence shows they are more likely to raise prices, reduce competitiveness, deter investment, and fuel geopolitical instability. The vision of millions of factory jobs ig...
•
11:21

CYFIRMA Research- Hannibal Stealer: A Rebranded Threat Born from Sharp and TX Lineage
Read CYFIRMA’s report on the Hannibal Stealer, a rebranded variant of SHARP and TX Stealers, which has re-emerged with expanded data exfiltration capabilities and an updated command-and-control infrastructure. Hannibal Stealer is built in C# on...
•
8:38

CYFIRMA Research- Technical Malware Analysis Report: Python-based RAT Malware
A New Breed of Python-Based RATs is Abusing Discord for C2 The CYFIRMA research team has investigated an emerging class of Python malware that is turning popular platforms into weaponized control panels. One recent variant showcase...
•
6:12

CYFIRMA Research- Scamonomics: The Dark Side of Stock & Crypto Investments in India
Cybercriminals are impersonating trusted business executives and financial experts to trap unsuspecting investors. These scammers are creating fake investment firms with fraudulent registration details, professional-looking websites and manipul...
•
7:14

CYFIRMA Research: Cyber Espionage Among Allies- Strategic Posturing in an Era of Trade Tensions
The CYFIRMA research team provides a comprehensive analysis of how diplomacy, defense, and digital strategy are colliding:As trade friction intensifies especially under the 2025 U.S. tariff regime, cyberspace is becoming the frontier of...
•
8:44

CYFIRMA Research- Tik-Tok: China’s Digital Weapon System?
U.S. President Donald Trump, once a critic but now a supporter of TikTok, is granting the app’s China-based parent company, ByteDance, a second 75-day extension to finalize a deal that would transfer ownership of TikTok to an American entity. W...
•
9:42

CYFIRMA Research- Tracking Ransomware: March 2025
Stay ahead of evolving ransomware threats with CYFIRMA’s Monthly Ransomware Report – March 2025. The month of March saw shifting dynamics, with Safepay experiencing a huge surge of 223%, while RansomHub and Akira declined. Babuk2 ha...
•
5:51

CYFIRMA Research- The Neptune RAT
CYFIRMA researchers have identified a dangerous new version of Neptune RAT being actively shared online. This malware spreads through GitHub, Telegram, and YouTube, often advertised as the "Most Advanced RAT." The attack starts when victims run...
•
9:34

CYFIRMA Research- Analysis of Konni RAT: Stealth, Persistence, and Anti-Analysis Techniques
CYFIRMA’s research team has conducted an in-depth investigation into Konni RAT, a sophisticated remote access trojan (RAT) that uses advanced evasion techniques to bypass detection. It exploits Windows features, such as file extens...
•
4:58

CYFIRMA Research- ANALYSIS OF A DISCORD-BASED REMOTE ACCESS TROJAN (RAT)
Hackers are leveraging Python-based Discord RATs to exploit Discord’s API as a Command and Control (C2) platform. This sophisticated malware allows attackers to gain complete control over compromised systems, making it a serious cybersecurity r...
•
6:49

CYFIRMA Research: Turning Aid into Attack- Exploitation of Pakistan's Youth Laptop Scheme to Target India
The CYFIRMA research team has identified a fake Indian Post Office website leveraging the Clickfix technique to target Indian users. The report details how a Pakistani threat actor is targeting both Windows and Android users by dropping APK fil...
•
7:08

CYFIRMA Research- CVE-2025-24813: Apache Tomcat RCE Vulnerability Analysis
Critical Alert: Immediate action is required for all organizations using Apache Tomcat!CVE-2025-24813 is a critical Remote Code Execution (RCE) vulnerability that allows attackers to bypass security controls via a path equivalence flaw,...
•
4:47
