Archive V4.0

Reports Archive:
Research & Analysis

A comprehensive collection of technical reports, security analyses, and in-depth research. Exploring the depths of digital security with a critical lens.

RSS Feed

Receive our latest reports directly in your RSS reader. No ads, no tracking.

Filter:
Destructive Cyber Operations
17 min read
Attackers created a piece of malware and registered the MahsaAlert domain as its C2 server, deceiving global security systems and causing this civil alert platform to be blocked.
Read Report
Surveillance Policy & Regulation
28 min read
With the internet in Iran shut down by the government of the Islamic Republic in January 2026, a familiar question resurfaced: Is the country becoming North Korea?
Read Report
Surveillance Policy & Regulation
24 min read
How Centralized Authentication, Infrastructure Level Monitoring and Interception, Spyware Operations, and Street Level Surveillance Have Converged into a Unified System for Controlling, Suppressing, and Intercepting Citizens
Read Report
Technology Supply Chains
28 min read
Examining the Role of Ofogh Saberin Co in Iranian Ministry of Defense Jamming Projects and the Export of Digital Repression Technologies
Read Report
Destructive Cyber Operations
6 min read
Persistent Access and Covert Command and Control within the Islamic Republic of Iran’s Surveillance and Interception Architecture
Read Report
Destructive Cyber Operations
4 min read
Examining the Organizational Logic, Operational Architecture, and the Role of a Modular RAT in Charming Kitten’s Covert Digital Surveillance
Read Report
Digital Censorship & Repression
11 min read
Bill on Supporting and Addressing Violations in the Field of Pervasive Audio and Video in Cyberspace (Internet) in Iranian Parliament
Read Report
Digital Censorship & Repression
4 min read
The Islamic Republic’s Legal and Technical Case Against Starlink at the UN
Read Report
Surveillance Policy & Regulation
13 min read
The UN Special Rapporteur on human rights warned of internet shutdowns, systematic censorship, arbitrary surveillance and online and offline repression of Iranian activists and citizens.
Read Report
Destructive Cyber Operations
10 min read
An Android spyware called Aks-e Yadegari (Souvenir Photo) is spreading through Telegram, targeting Iranian cryptocurrency exchanges.
Read Report