WOOF locker: Unmasking the browser locker behind a stealthy tech support scam operation

We reveal the inner workings of WOOF locker, the most sophisticated browser locker campaign we’ve seen to date. Learn how this tech support scam evades researchers and ensnares users by hiding in plain sight.

Read more

Spelevo exploit kit debuts new social engineering trick

In order to maximize infection rate, threat actors are now launching the Spelevo exploit kit with a decoy adult site, social engineering users into downloading a malicious video player.

Read more

300 shades of gray: a look into free mobile VPN apps

Mobile VPN apps are one of the best tools for protecting user privacy. Unfortunately, a notable number of are deemed unsafe. Read on to find out how to assess the best mobile VPN for you.

Read more

Say hello to Lord Exploit Kit

In this blog, we take a look at a new exploit kit distributed via malvertising that calls itself Lord EK.

Read more

Threat Spotlight: Sodinokibi ransomware attempts to fill GandCrab void

There’s a new ransomware-as-a-service (RaaS) in town, and it can twist tongues for giggles as much as twist organizations’ arms for cash. Get to know the Sodinokibi ransomware, including how to protect against this fledgling threat.

Read more

Fake jquery campaign leads to malvertising and ad fraud schemes

We look for answers in a long-running and yet mysterious malware campaign that has compromised thousands of websites to date.

Read more

GreenFlash Sundown exploit kit expands via large malvertising campaign

The GreenFlash exploit kit, which we typically saw targeting South Korean users, reaches globally with a large malvertising campaign via a popular website.

Read more

Recipe for success: tech support scammers zero in via paid search

We take a deep dive into the recently reported Azure-hosted tech support scam pages, identifying this as one of the most successful scam campaigns in use today.

Read more

How gamers can protect against increasing cyberthreats

We take a look at the various cyberthreats video gamers may encounter online, their real-world consequences, and what users can do to protect themselves.

Read more

Plugin vulnerabilities exploited in traffic monetization schemes

The latest round of vulnerable WordPress plugins leads to an active traffic monetization campaign via hacked websites.

Read more

Select your language