Malware
Malvertising and Google Ads: Protecting High Net-Worth Individuals and Executives
Do you use Google’s Search functionality to find products or services to solve a problem you have? I’m guessing that the majority of people reading this article do this regularly or have ...
ReliaQuest: Watch Out for Info-Stealers and RATs
ReliaQuest ranked LummaC2 and SocGholish among the top malware seen in Q2 and rounded out the top five list with AsyncRat, Oyster, and the growing numbers of info-stealers that were built using ...
Human Error – An Overlooked Aspect of Cyber Risk
Recent research shows that human error can account for 95% of all cybersecurity incidents. What’s more shocking is that only one-third of all companies offer cybersecurity awareness training for their employees ...
Rat Traps: Emulating AsyncRAT with AttackIQ Flex
In the ultramodern, mercurial sphere of cybersecurity, somehow a 1700-year-old quote from Helena of Constantinople still deeply resonates. Even with seemingly robust defenses, the smallest vulnerability can be an open invitation for ...
Living-Off-Trusted-Sites (LOTS) or should we say services?
"Living Off-Trusted Sites (LOTS)" is not a new cybercrime tactic, but it continues to pose a significant threat. Join us as we explore the evolution of LOTS, its impact on online trust ...
CISA Issues Warning: CrowdStrike Outage May Lead to Phishing and Malware Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding the recent CrowdStrike outage, warning that malicious actors are actively exploiting the situation to conduct phishing and other cyber ...
Dangling DNS and the dangers of subdomain hijacking
DNS attacks are becoming increasingly prevalent, with 90% of organizations experiencing them, as per the IDC Threat Intelligence Report 2023. Due to its critical function, DNS is a frequent target for cybercrimes, ...
Report Identifies More Than 250 Evil Twin Mobile Applications
The Satori Threat Intelligence Team funded by HUMAN Security, a provider of a platform thwarting bot-based attacks, today disclosed it has uncovered a massive ad fraud operation involving the setting up of ...
“Consider the Macro Perspective” — The Persistence of Macro-based Malware
“Consider the Macro Perspective” — The Persistence of Macro-based MalwareUse SquareX to put an end to their three-decade streakOffice documents, encompassing a range of formats such as Word, Excel, and PowerPoint, have become deeply ...
Biggest Ever Password Leak — but is ObamaCare’s RockYou2024 Really NEW?
Credential crunch: Ten billion plain-text passwords in a file—sky falling or situation normal? ...