Hackers Leverage Cloud Platforms to Spread Phishing Under the Radar

July 03, 2020 | Simon Kenin

Hunter

Lifesize Team, Room, Passport & Networker Remote OS Command Injection

February 07, 2019 | Simon Kenin

While working on various vulnerability research projects, I encountered ...

Hacker's Wish Come True After Infecting Visitors of Make-A-Wish Website With Cryptojacking

November 19, 2018 | Simon Kenin

After coming back from a vacation, the first thing to do is catch up with what ...

All Your Base64 Are Belong To Us – Dynamic vs. Static Analysis of Web Content

April 11, 2018 | Simon Kenin

I recently encountered an interesting phishing scheme when reviewing telemetry ...

Mass MikroTik Router Infection – First we cryptojack Brazil, then we take the World?

February 12, 2018 | Simon Kenin

On July 31st , just after getting back to the office from my talk at RSA Asia ...

BrickerBot mod_plaintext Analysis

December 19, 2017 | Simon Kenin

A week ago, the author of BrickerBot claimed that they retired and published ...

Underground Scams: Cutting the Head Off a Snake

February 02, 2017 | Simon Kenin

Shortly after publishing our post about Terror EK, "King Cobra" (a Twitter ...

CVE-2017-5521: Bypassing Authentication on NETGEAR Routers

January 30, 2017 | Simon Kenin

Home routers are the first and sometimes last line of defense for a network. ...

Terror Exploit Kit? More like Error Exploit Kit

January 09, 2017 | Simon Kenin

Q: What does it take to create a simple, yet fully functioning exploit kit?

Suzy’s Phishing Season

May 17, 2016 | Simon Kenin

Although most SWG-related blogs talk about exploit kits and malicious code, ...