Latest Insights

Supply Chain As the Perimeter
When the threat enters through the vendor, detection starts too late. Here is what we saw in the past twelve months — and what it demands from defenders. The perimeter is dead — and the supply chain buried it. Just over a month ago, we were invited by the Cyber Security and Technology Crime Bureau…
Silver Fox’s Dual-Pronged Strategy: Dissecting the ValleyRAT Distribution Campaign
The Silver Fox APT group employs a sophisticated, hybrid distribution strategy to maximize the reach of their custom-built ValleyRAT trojan, primarily aimed at Chinese-speaking victims. Rather than relying on a singly infection method, the group employs a multi-medium strategy to achieve both precision and scale. On one front, Silver Fox executes highly targeted phishing operations,…
When Hospitality Software is Too Hospitable: an XSS Filter Bypass and a Curious SSRF in Oracle Hospitality OPERA (CVE-2026-21966, CVE-2026-21967)
Last autumn, while a typhoon hammered against the hotel windows, our offensive specialist found themselves locked into a different kind of storm – a pentest that refused to stay routine. What began as a run-of-the-mill exercise quickly spiralled into yet another thrilling adventure of vulnerability disclosure. This writeup walks through DarkLab’s discovery of a Cross-Site…