Threat Intelligence

Dependency confusion: Compromising the supply chain

Public packages can be exploited and replaced with malicious ones at even the largest companies like Apple and more.

BendyBear: A shellcode attack used for cyberespionage

BendyBear malware has proven to be one of the most dangerous, and a threat to countries across the world.

Top 6 ransomware strains to watch out for in 2020

Ransomware remains the number one security risk to businesses and users, even though attacks have slowed down — or have they? Key findings from the 2020 Veri

2020 Verizon data breach investigations report: Summary and key findings for security professionals

The Verizon Data Breach Investigations Report, or the Verizon Data Breach Report, is an annual report intended for information security professionals. It sum

How hackers use CAPTCHA to evade automated detection

Introduction CAPTCHA seems to be everywhere we look. These sloppy characters are on blogs, ticket websites, shopping portals — you name it. Those cars you ne

The State of Ransomware 2020: Key findings from Sophos & Malwarebytes

Introduction Ransomware has become one of the most common and well-known threats to cybersecurity. 2020 saw a notable increase in ransomware attacks specific

Dark web fraud: How-to guides make cybercrime too easy

Introduction to dark web fraud Dark web fraud constitutes a global information security problem. The widespread availability of how-to guides providing instr

Top 6 malware strains to watch out for in 2020

Introduction: The upsurge of malware Malware is a favorite way for cybercriminals to launch attacks. A number of malware types have made the news as responsi

Top Cybersecurity Predictions for 2020

The 2020 Cybersecurity Landscape Here we are again for the annual prediction of the events that I believe will impact the cybersecurity landscape in the next

Malware spotlight: What is click fraud?

Introduction Click fraud is a well-known method for fraudsters to make money by taking advantage of online affiliates. It typically involves an ad placed on