Dontae Chambers

Dontae Chambers is a Cyber Threat Intelligence Analyst at Vercara. His distinguished career began in the U.S. Marine Corps, where he honed his expertise as a Human Intelligence (HUMINT) and All-Source Intelligence analyst. Since transitioning to the cybersecurity field, Dontae has played a crucial role in safeguarding extensive enterprise networks. His oversight of incident response and vulnerability management has been pivotal in fortifying network defenses against the ever-evolving cyber threat landscape.

Articles by Dontae Chambers

April 15, 2025

Vercara’s Open-Source Intelligence (OSINT) Report – April 04 – April 10, 2025

Weekly OSINT report: WinRAR flaw, Mirai botnet surge, AkiraBot spam campaign, and Fast Flux threats powering resilient malware and phishing.
March 19, 2025

Vercara’s Open-Source Intelligence (OSINT) Report – March 7 – March 13, 2025

This week's OSINT Report highlights major cyber threats: Dark Storm’s DDoS claims, Ballista botnet infections, SSRF exploits, and a new polymorphic attack cloning browser extensions.
March 5, 2025

Vercara’s Open-Source Intelligence (OSINT) Report – February 21 – February 27, 2025

Cisco confirms Salt Typhoon targeted U.S. telecoms using stolen credentials. Also covered: LockBit via Confluence, massive M365 botnet, Linux malware, & AI-driven DDoS.
February 11, 2025

Vercara’s Open-Source Intelligence (OSINT) Report – January 31 – February 6, 2025

Phorpiex botnet, DeepSeek malware, AsyncRAT, and Go Resty attacks—discover how Vercara’s UltraWAF, UltraDDR, and UltraAPI bolster security and resilience.
December 10, 2024

Vercara’s Open-Source Intelligence (OSINT) Report – November 29 – December 5, 2024

CyberVolk blends ransomware with hacktivism, BlueAlpha hides in Cloudflare, Salt Typhoon infiltrates telecoms, and Gafgyt evolves to target Docker APIs.
November 12, 2024

Vercara’s Open-Source Intelligence (OSINT) Report – November 1 – November 7, 2024

Malware targets IoT, cloud, and APIs; botnets exploit router flaws; German police disrupt DDoS-for-hire; fake invoices and PyPI threats emerge.
October 21, 2024

Vercara’s Open-Source Intelligence (OSINT) Report – October 11 – October 17, 2024

Learn about the indictment of Anonymous Sudan hackers, EDRSilencer's misuse, DDoS attacks on Internet Archive, and the rise of RansomHub ransomware
September 30, 2024

Vercara’s Open-Source Intelligence (OSINT) Report – September 20 – September 26, 2024

Stay updated on emerging threats: GorillaBot DDoS, DragonForce RaaS, SloppyLemming APT, Ivanti flaws, and ENISA's hacktivist warnings in this week's OSINT report.
September 10, 2024

Vercara’s Open-Source Intelligence (OSINT) Report – August 30 – September 5, 2024

Discover how the stealthy "sedeThe U.S. seized 32 pro-Russian propaganda domains linked to disinformation campaigns targeting U.S. elections, using fake profiles and Russian-backed media in Vercara's latest OSINT Report.
August 19, 2024

Vercara’s Open-Source Intelligence (OSINT) Report – August 9 – August 15, 2024

Vercara OSINT Report (Aug 9-15, 2024): New EDR-killing ransomware, Iranian phishing campaigns, FBI takedown of ransomware servers, and widespread malware force-installing browser extensions. Stay updated on emerging threats.
July 30, 2024

Vercara’s Open-Source Intelligence (OSINT) Report – July 19 – July 25, 2024

France initiates a major cyber operation ahead of the Olympics, targeting PlugX malware. Spain arrests pro-Russian hackers. Hacktivists leak CrowdStrike data. Major DDoS trends analyzed.
July 16, 2024

Vercara’s Open-Source Intelligence (OSINT) Report – July 5 – July 11, 2024

Vercara's OSINT Report (July 5-11, 2024): U.S. seizes AI-powered Russian bot farm domains, ransomware groups focus on defense evasion, OpenSSH and PHP vulnerabilities exploited, and Akira ransomware's rapid data exfiltration.
  • Solutions
  • Products
  • Industries
  • Why Vercara
  • Plans
  • Partners
  • Resources
  • Company