Threat Intelligence Feeds for Better DDoS Protection DDoS (distributed denial of service) attacks have become a major threat to a huge variety of businesses, from the smallest Shani Czyzyk |March 22, 2023
Dependency Confusion Attacks In recent years, there has been a significant increase in the number of software supply chain attacks. These attacks target Pascal Geenens |February 13, 2023
What is Card Testing? Card testing, also known as card checking, is a form of fraud where criminals try to determine if stolen credit Daniel Smith |February 09, 2023
Bots Are Now Robocalling to Phish For Your Two-Factor Authentication (2FA) Codes Most of us are familiar with Two-Factor Authentication, or 2FA, as an additional security measure when logging in to various Neetu Singh |February 01, 2023
Exploring Killnet's Social Circles It is not common for analysts to have the opportunity to study the social circles of criminal organizations, but occasionally Daniel Smith |January 27, 2023
The LinkedIn Data Scraping Verdict — and Its Reversal In October of last year, a ruling against LinkedIn by The United States Court of Appeals for the Ninth District Richard Arneson |December 12, 2022
What is the W4SP Information Stealer? While colder weather puts most bugs at rest until spring ushers in warmer temps, there’s one critter with a different Richard Arneson |December 01, 2022
Credential Access via Information Stealers Throughout 2022, the theft of user credentials continued to blanket the threat landscape. A recent example that illustrates both the Daniel Smith |November 18, 2022
OpenSSL CVE-2022-3786 and CVE-2022-3602: X.509 Email Address Buffer Overflows OverviewAfter a week of speculation about OpenSSL vulnerabilities, the OpenSSL project disclosed two new CVEs to address buffer overrun vulnerabilities Pascal Geenens |November 02, 2022
The Return of LOIC, HOIC, HULK, and Slowloris to the Threat Landscape In June 2021, I wrote a blog questioning if decade-old denial-of-service tools were still relevant. At the time, I had Daniel Smith |August 16, 2022
How Will Cyber Threats Impact the Beijing Winter Olympics? The Olympics is a one-of-a-kind event that garners attention from every corner of the world, digital and in-person. So it Daniel Smith |February 03, 2022
2022 Cyber Predictions: Preparing for Future Security Challenges The pandemic and subsequent economic shocks have spawned innovations in technology, including large steps forward in the cloud and edge Radware |January 11, 2022