Rebooting Killnet, a New World Order and the End of the Tesla Botnet In a recent move, KillMilk, the enigmatic figure at the helm of Killnet, disbanded the group's main roster. The sweeping Pascal Geenens |June 06, 2023
India One of the Most Targeted Countries for Hacktivist Groups In the last three months, hacktivists have claimed 480 DDoS attacks targeting Indian websites, making India the most targeted country Pascal Geenens |May 17, 2023
Hacktivists Bring OpIsrael Back to Life Last week, Radware issued a threat alert to highlight the concern that Anonymous operations such as OpIsrael could present a Daniel Smith |April 05, 2023
Pro-Russian Hacktivists: A Reaction to a Western Response to a Russian Aggression Newton’s third law of motion states that for every action, there is an equal and opposite reaction. With a slight Pascal Geenens |March 27, 2023
Threat Intelligence Feeds for Better DDoS Protection DDoS (distributed denial of service) attacks have become a major threat to a huge variety of businesses, from the smallest Shani Czyzyk |March 22, 2023
Dependency Confusion Attacks In recent years, there has been a significant increase in the number of software supply chain attacks. These attacks target Pascal Geenens |February 13, 2023
What is Card Testing? Card testing, also known as card checking, is a form of fraud where criminals try to determine if stolen credit Daniel Smith |February 09, 2023
Bots Are Now Robocalling to Phish For Your Two-Factor Authentication (2FA) Codes Most of us are familiar with Two-Factor Authentication, or 2FA, as an additional security measure when logging in to various Neetu Singh |February 01, 2023
Exploring Killnet's Social Circles It is not common for analysts to have the opportunity to study the social circles of criminal organizations, but occasionally Daniel Smith |January 27, 2023
The LinkedIn Data Scraping Verdict — and Its Reversal In October of last year, a ruling against LinkedIn by The United States Court of Appeals for the Ninth District Richard Arneson |December 12, 2022
What is the W4SP Information Stealer? While colder weather puts most bugs at rest until spring ushers in warmer temps, there’s one critter with a different Richard Arneson |December 01, 2022
Credential Access via Information Stealers Throughout 2022, the theft of user credentials continued to blanket the threat landscape. A recent example that illustrates both the Daniel Smith |November 18, 2022