These past few days, it appears that Facebook (and YouTube) has become the launchpad to yet another celebrity death hoax. This…
Year: 2016
Last week, we did an in-depth analysis of Smoke Loader, took a closer look into Neutrino exploit kit’s jQueryGate, found a…
EoRezo which is sometimes called Tuto4PC, is a family of software bundles that typically offers something useful for free and then…
This time we will have a look at another payload from recent RIG EK campaign. It is Smoke Loader (Dofoil), a…
We recently sponsored a deep-dive study conducted by Osterman Research on the subject of Ransomware, and the results are a stark insight…
Remember those fake Facebook Security pages we’ve documented earlier this year? Here’s a quick refresher if not: Recently, we noticed a…
In the cybercrime landscape, Exploit Kits (EKs) are the tool of choice to infect endpoints by exploiting software vulnerabilities. However, a…
If you have read the blog post about Tech Support Scammers using the Winlogon Shell registry value, you know the basics…
Last week, we talked about a donation 419 scam, gave an overview of what an APT is, counted the ways one…
Many people wonder why websites, even very small ones such as personal blogs, ever get hacked. While there are many possible…