Emotet revisited: pervasive threat still a danger to businesses

Emotet is often mentioned as one of the most annoying, effective, and costly present-day malware infections. We discuss the reasons why and the proper way to remove it.

Read more

New Golang brute forcer discovered amid rise in e-commerce attacks

E-commerce sites are a hot commodity these days. We dig into how compromised PCs are helping to hack into them to inject skimmers, whether via vulnerabilities in the websites themselves or through a new malware we discovered gaining entry via brute force.

Read more

Flaw in Twitter form may have been abused by nation states

Twitter announced in a blog post Monday that they discovered and addressed a security flaw in one of their support forms. The discovery was made on November 15—more than a month ago—and promptly fixed the next day. So why are we only hearing about it now?

Read more

The 25th anniversary of the webcam: What did it bring us?

This month the webcam has been around for 25 years. How has it developed and which are the concerns surrounding webcams and CCTVs?

Read more

A week in security (August 6 – August 12)

A round-up of the security news from August 6 – August 12, including ransomware, interesting talks during BlackHat, botnets, and the evils of JavaScript.

Read more

Trojans: What’s the real deal?

We take a fresh look at Trojans: the history of the term, the most popular threats over the years, the different types of Trojans, and their relationship with social engineering.

Read more

A week in security (June 4 – June 10)

A roundup of the security news from June 4 – June 10, including IoT botnets, government attacks, dodgy Wi-Fi, and more.

Read more

Internet Shortcut used in Necurs malspam campaign

The Necurs gang tries out a new trick to load malware and bypass security defenses.

Read more

Avzhan DDoS bot dropped by Chinese drive-by attack

The Avzhan DDoS bot is back in the wild again, this time being dropped by a Chinese drive-by attack. In this post, we’ll take a deep dive into its functionality and compare the sample we captured with the one described in the past.

Read more

A state of constant uncertainty or uncertain constancy? Fast flux explained

Although often seen as an illegal cybercriminal tactic, the methodology behind fast flux is actually far from evil. So how is it being abused? Read on to learn more.

Read more

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language