Threat Intelligence

Mechanics Behind Ransomware-as-a-Service

Introduction Ransomware is an increasingly serious concern, and this problem is getting worse over time. Initially, this malware began to compromise fixed ta

The Art of Fileless Malware

Introduction Malware has become a critical trend for companies around the world. We are looking at ransomware and other threats already lurking around the co

ZLAB MALWARE ANALYSIS REPORT: RANSOMWARE-AS-A-SERVICE PLATFORMS

Introduction Over the years, the diffusion of darknets has created new illegal business models. Along with classic illegal goods such as drugs and payment c

Which Are the Most Exploited Flaws by Cybercriminal Organizations?

Which are the weapons in the arsenal of cybercrime gangs? Which are the most exploited vulnerabilities? To respond to these questions let's analyze the annua

5 New Threats Every Organization Should be Prepared for in 2018

It is no wonder that 2017 was a year full of surprises in the world of cybersecurity. So far in 2018, we've seen new threats appear, and relatively older one

Memcrashed: The Dangerous Trend Behind the Biggest DDoS Attack Ever

Introduction In November 2017, a group of researchers provided a macroscopic characterization of the DoS ecosystem; they shared their findings at the AMC Int

Open source threat intelligence tools & techniques

The Internet, the network or networks is huge and has the most significant data you can ever think about; it is not limited to search the people or company i

Global Cost of Cybercrime on the Rise

Introduction Cyber-criminal activities worldwide continue to increase, in many cases, organized crime rings operate worldwide, and their profits are very hig

An Enterprise Guide to Using Threat Intelligence for Cyber Defense

Cybercrime has evolved significantly in recent years. While security teams struggle to ensure businesses remain protected, cyber attacks not only increase in

The Five Largest Ransomware Attacks of 2017

The Year 2017 had a lot of sleepless nights for the security professional, IT admins, etc. as huge cyber-attacks marred it. Targets of those cyber-attacks we