Introduction
This research, conducted by Bitdefender Labs, presents the first documented analysis of a ransomware campaign attributed to the RedCurl group (also known as Earth Kapre or Red Wolf). RedCurl has historically maintained a low profile, relying heavily on Living-off-the-Land (LOTL) techniques for corporate cyberespionage and data exfiltration. This shift to ransomware marks a significant evolution in its tactics.
This new ransomware, which we have named QWCrypt based on a self-reference ‘qwc’ found within the executable, is previously undocumented and distinct from known ransomware families.
By sharing our findings with the threat intelligence community and challenging existing ...
The Voice of Cyber®
Security Operations
Security Operations encompasses the processes, technologies, and personnel responsible for monitoring and responding to security incidents. Security Operations Centres (SOCs) play a central role in this domain, leveraging advanced tools and methodologies to detect, analyse, and mitigate potential cyber threats in real-time. Security Operations involves continuous monitoring of networks, systems, and applications, as well as incident response activities to address and neutralise security incidents promptly.
Newest Release
No results found.
Deep Dive Articles
Sort By
- Date
- Title

Organisations should follow several key steps to ensure that identity credentials are secure and user authorisations are appropriate.
IP address spoofing involves creating Internet Protocol (IP) packets with a fake source IP address. This is typically done with the intention of deceiving the recipient into ...

When organisations are hit by ransomware attacks and business operations go down, there’s often a rush to blame. Who’s responsible? Who should resign? Less often is the ...
Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly ...
Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain ...
This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of system hardening against exploit chains within SAP ...
No results found.
In The News
Sort By
- Date
- Title
Latest Fastly Bot Management update reduces CAPTCHA reliance, enhances bot detection, and highlights compromised credentials
Elastic Security Labs describes ABYSSWORKER, a malicious driver used with the MEDUSA ransomware attack-chain to disable anti-malware tools.
Splunk, the cybersecurity and observability leader, today released a new report “Downtime: A rising challenge for organisations in Australia & New Zealand”, which ...
Customers can tap into insights from Cloudflare’s global network – one of the largest in the world – which blocked an average of 227 billion cyber threats each day during Q4 2024
Integrated offering for Tines Workflow Automation and Elastic Search AI Platform helps increase operational efficiency, minimise security risk, and reduce downtime
The first few months of 2025 saw a massive spike in phishing-as-a-service (PhaaS) attacks targeting organizations around the world, with more than a million attacks detected ...
No results found.
Podcasts On Security Operations
No results found.
No results found.