India One of the Most Targeted Countries for Hacktivist Groups In the last three months, hacktivists have claimed 480 DDoS attacks targeting Indian websites, making India the most targeted country… Pascal Geenens | May 17, 2023
Hacktivists Bring OpIsrael Back to Life Last week, Radware issued a threat alert to highlight the concern that Anonymous operations such as OpIsrael could present a… Daniel Smith | April 5, 2023
Pro-Russian Hacktivists: A Reaction to a Western Response to a Russian Aggression Newton’s third law of motion states that for every action, there is an equal and opposite reaction. With a slight… Pascal Geenens | March 27, 2023
Threat Intelligence Feeds for Better DDoS Protection DDoS (distributed denial of service) attacks have become a major threat to a huge variety of businesses, from the smallest… Shani Czyzyk | March 22, 2023
Dependency Confusion Attacks In recent years, there has been a significant increase in the number of software supply chain attacks. These attacks target… Pascal Geenens | February 13, 2023
What is Card Testing? Card testing, also known as card checking, is a form of fraud where criminals try to determine if stolen credit… Daniel Smith | February 9, 2023
Bots Are Now Robocalling to Phish For Your Two-Factor Authentication (2FA) Codes Most of us are familiar with Two-Factor Authentication, or 2FA, as an additional security measure when logging in to various… Neetu Singh | February 1, 2023
Exploring Killnet’s Social Circles It is not common for analysts to have the opportunity to study the social circles of criminal organizations, but occasionally… Daniel Smith | January 27, 2023
The LinkedIn Data Scraping Verdict — and Its Reversal In October of last year, a ruling against LinkedIn by The United States Court of Appeals for the Ninth District… Richard Arneson | December 12, 2022
What is the W4SP Information Stealer? While colder weather puts most bugs at rest until spring ushers in warmer temps, there’s one critter with a different… Richard Arneson | December 1, 2022
Credential Access via Information Stealers Throughout 2022, the theft of user credentials continued to blanket the threat landscape. A recent example that illustrates both the… Daniel Smith | November 18, 2022
OpenSSL CVE-2022-3786 and CVE-2022-3602: X.509 Email Address Buffer Overflows Overview After a week of speculation about OpenSSL vulnerabilities, the OpenSSL project disclosed two new CVEs to address buffer overrun… Pascal Geenens | November 2, 2022