The Middle Eastern and North African (MENA) underground is characterized by its ironic mix of ideology and felony. We take a look at its inner workings, available wares, and the unique sense of brotherhood shared by its players.
ATM malware has become a mainstay in many cybercriminals’ arsenal due to its capability to steal money. In our joint efforts with Europol’s EC3, we explain in detail how criminals continue to leverage different ATM malware families and attack types.
This research paper explores the tools and methods used to spread fake news and manipulate public opinion: the services that enable them, their appearance on social media sites, and the motivations behind these activities.
Chat platforms have become popular as office communication tools thanks to availability of APIs that allow users to integrate the apps. Can they be abused?
Cities around the world are getting smarter, but are they being designed with security in mind?
A complete discussion of the different vulnerability categories, including case studies of vulnerable SCADA HMIs. The paper also provides a guide for vulnerability researchers, as well as vendors on quick and efficient bug discovery.
The modern world relies heavily on industrial robots. But is the current robotics ecosystem secure enough to withstand a cyber attack?
This paper takes a look at Pawn Storm's operations within the last two years, and how the group has expanded their activities from espionage to the use of cyber propaganda tactics.