What is Card Testing? Card testing, also known as card checking, is a form of fraud where criminals try to determine if stolen credit Daniel Smith |February 09, 2023
Bots Are Now Robocalling to Phish For Your Two-Factor Authentication (2FA) Codes Most of us are familiar with Two-Factor Authentication, or 2FA, as an additional security measure when logging in to various Neetu Singh |February 01, 2023
Exploring Killnet's Social Circles It is not common for analysts to have the opportunity to study the social circles of criminal organizations, but occasionally Daniel Smith |January 27, 2023
The LinkedIn Data Scraping Verdict — and Its Reversal In October of last year, a ruling against LinkedIn by The United States Court of Appeals for the Ninth District Richard Arneson |December 12, 2022
What is the W4SP Information Stealer? While colder weather puts most bugs at rest until spring ushers in warmer temps, there’s one critter with a different Richard Arneson |December 01, 2022
Credential Access via Information Stealers Throughout 2022, the theft of user credentials continued to blanket the threat landscape. A recent example that illustrates both the Daniel Smith |November 18, 2022
OpenSSL CVE-2022-3786 and CVE-2022-3602: X.509 Email Address Buffer Overflows OverviewAfter a week of speculation about OpenSSL vulnerabilities, the OpenSSL project disclosed two new CVEs to address buffer overrun vulnerabilities Pascal Geenens |November 02, 2022
The Return of LOIC, HOIC, HULK, and Slowloris to the Threat Landscape In June 2021, I wrote a blog questioning if decade-old denial-of-service tools were still relevant. At the time, I had Daniel Smith |August 16, 2022
How Will Cyber Threats Impact the Beijing Winter Olympics? The Olympics is a one-of-a-kind event that garners attention from every corner of the world, digital and in-person. So it Daniel Smith |February 03, 2022
2022 Cyber Predictions: Preparing for Future Security Challenges The pandemic and subsequent economic shocks have spawned innovations in technology, including large steps forward in the cloud and edge Radware |January 11, 2022
Radware Threat Researchers Live: Ep.17 Tune in to learn about the log4j vulnerability and how a 6-year-old JDNI exploit became urgent overnight.Our Threat Intelligence Researchers Radware |December 17, 2021
Ransomware & Ransom DoS, Why They Are Similar But Different Since 2020, ransomware and ransom denial-of-service (RDoS) have become ubiquitous with ransomware attacks grabbing headlines nearly every week. W Pascal Geenens |November 30, 2021