August 12, 2016 - Keeping up with twists and turns on the exploit kit scene, we examine a new redirection mechanism to Neutrino EK which adds fingerprinting way up the infection chain by crafting a special Flash file and uploading it on compromised hosts. This ensures proper filtering of non desirable traffic even before the gate to the exploit kit.
August 12, 2016 - Want to keep your computer and data safe at school? Here's all you need to know about college cybersecurity best practices.
August 11, 2016 - We take a technical look at validating the leaked Chimera ransomware keys as well as if we can decrypt files with these keys.
August 11, 2016 - We've looked at the social engineering tactic of inserting a fake account into a conversation with legitimate support channels in the past, and today - thanks to Techhelplist - we can observe another one, this time going after Natwest bank logins. See how Twitter scammers are trying to steer potential victims away from legitimate support channels to phishing websites.
August 10, 2016 - In this malvertising campaign, both RIG EK and Sundown EK are used to deliver the same threat, an indication that the actor behind it is either testing or maximizing infection rates.