Security Research

Red Asgard Blog

Insights, research findings, and security best practices from the front lines of cybersecurity.

Subscribe via RSS
February 28, 2026

Hunting Lazarus, Part 5: Eleven Hours on His Disk

Forensic examination of an active Lazarus Group operator machine: a target list of nearly 17,000 developers, six drained wallets, and a plaintext file containing his own keys.

lazarusdprkthreat-intel
By Threat Research Team
February 13, 2026

Claude MAX vs Codex: The Real Operating Model

We burned through our Claude MAX weekly quota two days before renewal. So we gave Codex a try. Here's what happened.

ai-securityclaudecodex
By Red Asgard AI Research
February 11, 2026

Claude MAX Token Economics: The Invisible Meter

You're paying $200/month for unlimited AI assistance. Except it's not unlimited, the limits keep changing without notice, and nobody can tell you how close you are to hitting them.

ai-securityclaudeanthropic
By Red Asgard AI Research
February 3, 2026

Hunting Lazarus Part IV: Real Blood on the Wire

It has been only days since we published Part III—where we asked whether we were hunting Lazarus or walking into a honeypot. We did not expect to be back this soon. But what we found makes everything before it look like a prologue.

threat-intelligenceaptlazarus
By Red Asgard Threat Research Team
February 1, 2026

Hunting Lazarus Part III: The Infrastructure That Was Too Perfect

We discovered a second malware family, mapped approximately 20 ghost servers with consistent configurations, attempted to exploit the C2 infrastructure—and ended up questioning whether we were hunting them, or they were hunting us.

threat-intelligenceaptlazarus
By Red Asgard Threat Research Team
January 23, 2026

Hunting Lazarus Part II: When the Dead Drop Moved to the Blockchain

The attackers couldn't keep their Pastebin accounts online. So they moved their payload delivery to infrastructure that can't be taken down.

threat-intelligenceaptlazarus
By Red Asgard Threat Research Team
January 12, 2026

Hunting Lazarus: Inside the Contagious Interview C2 Infrastructure

We found North Korean malware in a client's Upwork project. Then we spent five days mapping the attackers' infrastructure.

threat-intelligenceaptlazarus
By Red Asgard Threat Research Team
December 17, 2025

The End of Syntax Privilege: Why LLMs Are Just the Latest Compiler

For most of software engineering history, the hardest skill was translating intent into correct syntax. Syntax mastery became a proxy for competence itself. Large language models quietly break that assumption - and force the industry to confront what engineering skill has always actually been.

aillmsoftware-engineering
By Red Asgard Security Team
December 16, 2025

The AI Red Team Maturity Model: A Capability-Based Framework for LLM Security Testing

Most organizations testing their AI systems are doing it wrong. This five-level maturity framework provides structure for understanding where you are, what capabilities you need next, and how much it will cost to get there.

ai-securityred-teamingllm
By Red Asgard Security Team
December 15, 2025

Context Manipulation: A Red Team Guide to Attacking Web3 AI Agents

Web3 AI agents control millions in crypto assets with irreversible transaction finality. Traditional prompt injection barely scratches the attack surface. This guide introduces context manipulation - a comprehensive offensive methodology targeting the memory, oracles, and input channels that autonomous agents trust.

web3ai-securityred-teaming
By Red Asgard Security Team
December 14, 2025

MCP Security: What We're Finding in AI Agent Assessments

The protocol that's becoming the standard interface between AI and enterprise systems has security gaps most organizations haven't yet learned to see.

mcpai-securitysecurity-assessment
By Red Asgard Security Team
November 3, 2025

Balancer V2 Vault Exploit: Forensic Analysis of $117M Breach

Preliminary forensic analysis of the Nov 3, 2025 Balancer V2 exploit with on-chain verification and a per-chain verification plan. Official disclosure pending.

defiexploitbalancer
By Red Asgard Security Research Team
October 28, 2025

threat-intel: Comprehensive Threat Intelligence Framework for Rust

Red Asgard's threat-intel provides multi-source threat aggregation, CVE integration, and automated risk assessment for security operations teams.

rustthreat-intelligencecve
By Red Asgard Security Team
October 27, 2025

quantum-shield: Production-Ready Post-Quantum Cryptography for Rust

Red Asgard releases quantum-shield, implementing NIST-standardized post-quantum algorithms (Kyber, Dilithium) for hybrid quantum-resistant encryption and signatures.

rustcryptographypost-quantum
By Red Asgard Security Team
October 26, 2025

path-security: 85%+ Attack Vector Coverage for Path Traversal Prevention

Introducing path-security, Red Asgard's comprehensive Rust library defending against 85+ path traversal attack vectors including unicode, encoding, and exotic bypasses.

rustsecuritypath-traversal
By Red Asgard Security Team
October 25, 2025

module-registry: Type-Safe Dynamic Plugin System for Rust Applications

Red Asgard releases module-registry, a powerful Rust crate enabling compile-time discovery and runtime instantiation of plugins with type safety guarantees.

rustpluginsextensibility
By Red Asgard Security Team
October 24, 2025

blockchain-runtime: Blockchain-Agnostic Testing and Simulation Framework for Rust

Red Asgard releases blockchain-runtime, a powerful Rust crate for dynamic blockchain analysis, testing, and simulation across multiple chains without vendor lock-in.

rustblockchaintesting
By Red Asgard Security Team
October 23, 2025

Introducing llm-security: Comprehensive Rust Library for LLM Protection

Red Asgard releases llm-security, an open-source Rust crate providing defense-in-depth protection against prompt injection, jailbreaks, and LLM manipulation attacks.

rustllmai-security
By Red Asgard Security Team
January 15, 2025

Welcome to Red Asgard Security Research Blog

Introducing our new security research blog where we share insights, vulnerabilities, and best practices from the front lines of cybersecurity.

announcementsecurityresearch
By Red Asgard Team