Last week, we looked into expired domain names being used for malvertising, delved into dubious Facebook apps, and checked out Chinese…

Who likes threats? Nobody, as it turns out. That hasn’t stopped scammers from jumping on the menacing email train – next…

[updates 9/14/2017] Equifax has released information and confirmed the vulnerability (CVE-2017-5638) that was used in this breach after several days of…

With the release of Chrome v62 in less than 3 months, Google will begin marking non-HTTPS pages with text input fields—like…

What are false positives? False positive, which is sometimes written as f/p, is an expression commonly used in cybersecurity to denote…

Users in English speaking countries are quite familiar with the Nigerian scam: an important guy in Nigeria needs your help getting…

It is my assumption that most Facebook users don’t look at their own profile often. With your own profile, I mean…

In Q1 and Q2 of 2017, we noticed a sharp decline in drive-by downloads coming from compromised websites. The campaigns of…

Last week, we looked at what actions Kronos can perform in the final installment of a 2-part post. We also dived…

Recently, our friends at Barracuda found a new phishing campaign that banks on the popularity of cloud services used in most businesses, such as Microsoft Office 365. According…