Users of gaming platform Steam have the ability to upload images from games, post messages, and more besides, into their social network…
Year: 2017
We all know about tech support scams by this point. We know how they cold call, lie their way into your…
Sage is yet another ransomware that has become a common threat nowadays. Similarly to Spora, it has capabilities to encrypt files…
When looking at malicious traffic, one of the things we are interested in are the hosts involved in a particular attack. For…
Exploits: they’re not your mama’s cyberthreats. At one point in the not-so-distant past, exploits were responsible for delivering 80 percent of…
Last week, we investigated Twitter app scammers using stolen celebrity nudes as bait, explored the world of Chinese PUPs and backdoors, took…
A phishing campaign currently in circulation is attempting to bait World of Warcraft with the promise of free in-game pets. We’ve…
In this article, we will try to explain the terms packer, crypter, and protector in the context of how they are…
BLU manufactured mobile devices have been discovered with preinstalled adware known as Android/Adware.YeMobi. Behavior of YeMobiThe incriminating behavior of adware YeMobi is…
Recently we noticed a change on one of the domains that we monitor because they are known to host files related to…