This malware came in a phishing e-mail – disguised as a Bitcoin wallet. After clicking the link, user receives a JAR…

Last week, we talked about what Windows environmental variables are, more phishy sponsored tweets in the wild, and—if you haven’t actually…

Ignore the banner image of the man taking a likely ill-advised selfie in the front of his car for now, because…

Another day, another couple of rogue sponsored tweets [1], [2] which lead to phishing. The account pushing the first phish has…

This post was co-authored by @hasherezade and Jérôme Segura During the Christmas season and early into the new year, we noticed a sharp decrease…

Sometimes when you are looking for instructions to troubleshoot software issues or adapt software to your liking and you are looking…

Ad fraud is one of many issues that contribute to the ad industry’s negative image these days. Unlike malvertising which affects…

Last week, we pushed out an in-depth analysis of a Sundown exploit kit campaign dropping a miner for the cryptocurrency, Monero….

This post was authored by @hasherezade and Jérôme Segura We recently encountered an atypical case of Sundown EK in the wild – usually the landing…

Tech support scammers have been using various themes to push fake alerts to scare users into calling for assistance. These fall into…