top of page


When Malware Starts to Think: The Rise of AI-Powered Trojans (RATs)
AI-powered Remote Access Trojans (RATs) take polymorphic malware to the next level. These adaptive threats self-heal, mutate code in memory, and disguise C2 traffic within trusted services. At White Hat, our Red Teams deploy custom AI-powered RAT simulations to mirror these attacker behaviors, uncovering blind spots and validating whether defenses can withstand adaptive polymorphism in the wild.

Barak Sofir
Sep 4, 2025
Featured


When Malware Starts to Think: The Rise of AI-Powered Trojans (RATs)
AI-powered Remote Access Trojans (RATs) take polymorphic malware to the next level. These adaptive threats self-heal, mutate code in memory, and disguise C2 traffic within trusted services. At White Hat, our Red Teams deploy custom AI-powered RAT simulations to mirror these attacker behaviors, uncovering blind spots and validating whether defenses can withstand adaptive polymorphism in the wild.

Barak Sofir
Sep 4, 2025


Inside the ShinyHunters Campaign: OAuth at Scale, The Weak Link in SaaS Security
The ShinyHunters campaign exposed a blind spot in SaaS security: OAuth. By convincing employees to approve malicious apps, attackers bypassed MFA and gained persistent, large-scale access to CRM and other sensitive data across 90+ organizations, including Google, Pandora, and others. This shift marks “Extortion-as-a-Service 2.0,” where psychological manipulation - not technical exploits - drives breaches

Barak Sofir
Aug 27, 2025


White Hat Wins Global Award for Outstanding Cybersecurity Consulting
We are proud to share that White Hat (an EPAM company) has been named the 2025 Outstanding Cybersecurity Consultant at the Outstanding...

White Hat
Aug 17, 2025


From Periodic Scans to Continuous ASM: Closing the Exposure Gap
Most attack surface management programs rely on periodic scans. Attackers don’t. Using tools like Shodan and Censys, they identify exposed assets in real time — before internal teams even know they exist. This article outlines why snapshot-based ASM creates blind spots, and how continuous, intelligence-driven ASM catches what others miss — including leaked credentials, unknown environments, and critical misconfigurations.

Noa Elias
Aug 14, 2025


U.S. giant EPAM acquires cybersecurity startup White Hat
EPAM, which is traded on the New York Stock Exchange and has a market cap of $25 billion, is a leading global provider of digital...

White Hat
Jun 25, 2024


One Electron to Rule Them All
As red teamers, we are on a constant verge and quest to find new ideas and techniques to bypass defense systems and also potentially gain...

White Hat
Jun 25, 2024


A Step-by-Step Guide to Understanding The TFS Vulnerability in the Cortex EDR
TL;DR In this blog post, we will review a security gap that may allow access to sensitive log files before they are encrypted. This...

White Hat
Jun 13, 2024


Not the Access You Asked For: How Azure Storage Account Read/Write Permissions Can Be Abused for Privilege Escalation and Lateral Movement
TL;DR In this blog we will dive into some unexpected techniques that allow an Azure user with Storage Account permissions to abuse them...

White Hat
Jun 7, 2024
bottom of page
