Users of gaming platform Steam have the ability to upload images from games, post messages, and more besides, into their social network…
Month: March 2017
We all know about tech support scams by this point. We know how they cold call, lie their way into your…
Exploits: they’re not your mama’s cyberthreats. At one point in the not-so-distant past, exploits were responsible for delivering 80 percent of…
When looking at malicious traffic, one of the things we are interested in are the hosts involved in a particular attack. For…
Sage is yet another ransomware that has become a common threat nowadays. Similarly to Spora, it has capabilities to encrypt files…
A phishing campaign currently in circulation is attempting to bait World of Warcraft with the promise of free in-game pets. We’ve…
Last week, we investigated Twitter app scammers using stolen celebrity nudes as bait, explored the world of Chinese PUPs and backdoors, took…
BLU manufactured mobile devices have been discovered with preinstalled adware known as Android/Adware.YeMobi. Behavior of YeMobi The incriminating behavior of adware YeMobi…
In this article, we will try to explain the terms packer, crypter, and protector in the context of how they are…
Recently we noticed a change on one of the domains that we monitor because they are known to host files related to…