Understanding Angler Exploit Kit - Part 1: Exploit Kit Fundamentals
Generally speaking, criminal groups use two methods for widespread distribution of malware. The most common method is malicious spam (malspam). This is a fairly direct mechanism, usually through an...
View Article2020 Phishing Trends With PDF Files
We analyzed recent phishing trends with PDF files and noted a dramatic increase in the practice, as well as five approaches popular with attackers. The post 2020 Phishing Trends With PDF Files appeared...
View ArticleChromeLoader: New Stubborn Malware Campaign
A malicious browser extension is the payload of the ChromeLoader malware family, serving as adware and an infostealer, leaking users’ search queries. The post ChromeLoader: New Stubborn Malware...
View ArticleApateWeb: An Evasive Large-Scale Scareware and PUP Delivery Campaign
A network of over 130k domains was part of a campaign to deliver shareware, PUPs and other scams. We unravel the threads of this campaign from entry point to payload. The post ApateWeb: An Evasive...
View Article
More Pages to Explore .....