Hackers Leverage Cloud Platforms to Spread Phishing Under the Radar

Lifesize Team, Room, Passport & Networker Remote OS Command Injection

While working on various vulnerability research projects, I encountered multiple Authenticated ...

Read More

Hacker's Wish Come True After Infecting Visitors of Make-A-Wish Website With Cryptojacking

After coming back from a vacation, the first thing to do is catch up with what happened while you ...

Read More

All Your Base64 Are Belong To Us – Dynamic vs. Static Analysis of Web Content

I recently encountered an interesting phishing scheme when reviewing telemetry of incidents blocked ...

Read More

Mass MikroTik Router Infection – First we cryptojack Brazil, then we take the World?

On July 31st , just after getting back to the office from my talk at RSA Asia 2018 about how cyber ...

Read More

BrickerBot mod_plaintext Analysis

A week ago, the author of BrickerBot claimed that they retired and published their manifesto along ...

Read More

Underground Scams: Cutting the Head Off a Snake

Shortly after publishing our post about Terror EK, "King Cobra" (a Twitter account that we ...

Read More

CVE-2017-5521: Bypassing Authentication on NETGEAR Routers

Home routers are the first and sometimes last line of defense for a network. Despite this fact, ...

Read More

Terror Exploit Kit? More like Error Exploit Kit

Q: What does it take to create a simple, yet fully functioning exploit kit?

Read More

Suzy’s Phishing Season

Although most SWG-related blogs talk about exploit kits and malicious code, today we would like to ...

Read More