Pro-Russian Hacktivists: A Reaction to a Western Response to a Russian Aggression Newton’s third law of motion states that for every action, there is an equal and opposite reaction. With a slight Pascal Geenens |March 27, 2023
Threat Intelligence Feeds for Better DDoS Protection DDoS (distributed denial of service) attacks have become a major threat to a huge variety of businesses, from the smallest Shani Czyzyk |March 22, 2023
Dependency Confusion Attacks In recent years, there has been a significant increase in the number of software supply chain attacks. These attacks target Pascal Geenens |February 13, 2023
What is Card Testing? Card testing, also known as card checking, is a form of fraud where criminals try to determine if stolen credit Daniel Smith |February 09, 2023
Bots Are Now Robocalling to Phish For Your Two-Factor Authentication (2FA) Codes Most of us are familiar with Two-Factor Authentication, or 2FA, as an additional security measure when logging in to various Neetu Singh |February 01, 2023
Exploring Killnet's Social Circles It is not common for analysts to have the opportunity to study the social circles of criminal organizations, but occasionally Daniel Smith |January 27, 2023
The LinkedIn Data Scraping Verdict — and Its Reversal In October of last year, a ruling against LinkedIn by The United States Court of Appeals for the Ninth District Richard Arneson |December 12, 2022
What is the W4SP Information Stealer? While colder weather puts most bugs at rest until spring ushers in warmer temps, there’s one critter with a different Richard Arneson |December 01, 2022
Credential Access via Information Stealers Throughout 2022, the theft of user credentials continued to blanket the threat landscape. A recent example that illustrates both the Daniel Smith |November 18, 2022
OpenSSL CVE-2022-3786 and CVE-2022-3602: X.509 Email Address Buffer Overflows OverviewAfter a week of speculation about OpenSSL vulnerabilities, the OpenSSL project disclosed two new CVEs to address buffer overrun vulnerabilities Pascal Geenens |November 02, 2022
This was H1 2022: Part 3 – Beyond the War Being caught up in all the events and media attention stemming from the Russo-Ukrainian conflict, one could forget that there Pascal Geenens |August 18, 2022
The Return of LOIC, HOIC, HULK, and Slowloris to the Threat Landscape In June 2021, I wrote a blog questioning if decade-old denial-of-service tools were still relevant. At the time, I had Daniel Smith |August 16, 2022