• October 03, 2014
    Earlier this year, a website was compromised and used to spread online baking malware to approximately 7,000 victims in a span of two hours. This video describes how the site was compromised, the details of the attack, and the capabilities of the payloads.
  • October 01, 2014
    A look at the scope and scale of the threats that can be found on Twitter, including tweets that point to malicious URLs, phishing attacks.
  • September 26, 2014
    The evolution of PoS RAM Scraper malware, from their humble beginnings to the industrialized threats that they've become.
  • September 26, 2014
    Shellshock update: more attacks that exploit the Shellshock vulnerability have been detected, including exploit attempts in Brazil that seem to be targeting government institutions.
  • September 25, 2014
    The Bash vulnerability was reportedly already being exploited in the wild, only several hours after news first broke out. At least one sampled malware is capable of launching distributed denial-of-service (DDoS) attacks.
  • September 25, 2014
    While iOS users may not be as exposed to malicious apps, this does not mean that it is an impenetrable system. Beyond malware, risks and threats designed to affect Apple's mobile OS abound. Here some of the cases we've recorded.
  • August 29, 2014
    Point of sales (PoS) malware in the form of BlackPOS have been seen in the wild, masquerading as an antimalware service. Our analysis found new code designed to avoid easy detection.
  • August 28, 2014
    A new variant of the backdoor BIFROSE, known for its keylogging techniques, was found in an attack against a device manufacturer. The malware was already elusive back in 2010, but its use of TOR to reach its servers makes it even harder to track.
  • August 27, 2014
    “Windows 9 Free Download!“ sounds too good to be true but cybercriminals still use bait like this to get you to install adware on your computer.