Last week, we looked into expired domain names being used for malvertising, delved into dubious Facebook apps, and checked out Chinese…
Month: September 2017
Who likes threats? Nobody, as it turns out. That hasn’t stopped scammers from jumping on the menacing email train – next…
[updates 9/14/2017] Equifax has released information and confirmed the vulnerability (CVE-2017-5638) that was used in this breach after several days of…
With the release of Chrome v62 in less than 3 months, Google will begin marking non-HTTPS pages with text input fields—like…
What are false positives? False positive, which is sometimes written as f/p, is an expression commonly used in cybersecurity to denote…
Users in English speaking countries are quite familiar with the Nigerian scam: an important guy in Nigeria needs your help getting…
It is my assumption that most Facebook users don’t look at their own profile often. With your own profile, I mean…
In Q1 and Q2 of 2017, we noticed a sharp decline in drive-by downloads coming from compromised websites. The campaigns of…
Last week, we looked at what actions Kronos can perform in the final installment of a 2-part post. We also dived…
Recently, our friends at Barracuda found a new phishing campaign that banks on the popularity of cloud services used in most businesses, such as Microsoft Office 365. According…