top of page


The Case of the Vanishing Attachment and the Stolen Login
In 2025, the Russia-nexus Calisto intrusion set used spearphishing, trusted-contact impersonation, and redirector-based credential harvesting (including AiTM-style tactics) to target NGOs and other entities linked to Ukraine support, including Reporters Without Borders.
Dec 15, 202513 min read


FAIR INTEL Weekly RASE Report 12-15-2025
Resilience, Attack Surface, and Exposure (RASE)
Dec 15, 202514 min read


BRICKSTORM: Because Your Hypervisor Needed a Midlife Crisis
PRC state-sponsored cyber actors are deploying the BRICKSTORM backdoor to maintain long-term, stealthy access to VMware vSphere and related Windows infrastructure in government and IT organizations, enabling persistent control, lateral movement, and data exfiltration.
Dec 9, 202518 min read


TA569’s Fake Update Pop-Up: Now Featuring a Cameo by Russian Intelligence
Arctic Wolf Labs reports that RomCom, a Russian-aligned threat group, was observed delivering its Mythic Agent loader through the SocGholish framework for the first time, targeting a U.S. engineering firm with ties to Ukraine.
Nov 26, 202518 min read
bottom of page