Cybercrime & Digital Threats
- January 04, 2021This article aims to discuss the Linux threat landscape and examine how Linux has become an attractive target for attackers, as well as how it can be prone to a variety of threats and risks.
- December 28, 2020Cybercriminals use legitimate-looking domains in their phishing-and-scam schemes in an effort to lure more victims and avoid early detection.
- December 18, 2020We discovered a Negasteal variant that uses hastebin to filelessly deliver Crysis ransomware to the victim's system.
- November 19, 2020We discuss the present state of the malicious uses and abuses of AI and ML and the plausible future scenarios in which cybercriminals might abuse these technologies for ill gain.
- November 16, 2020We take a closer look at an emerging underground market that is driven by malicious actors who sell access to a gargantuan amount of stolen data, frequently advertised in the underground as “cloud of logs."
- November 16, 2020Communication apps have caught the eye of malicious actors who are always looking to integrate new techniques in their malicious activities.
- November 11, 2020Threat actors take advantage of the spread of COVID-19 for malicious campaigns. Goods and services related to the virus also appear in underground marketplaces and cybercriminal forums.
- November 04, 2020Starting this year, Ryuk began using another dropper called BazarLoader (also known as BazarBackdoor), which is primarily distributed via phishing emails that contain either malicious attachments or links to websites that host malware.
- October 12, 2020Our underground monitoring revealed several ways how criminals have been entertaining themselves during isolation, with normal activities that offer cyber-crime-related prizes.