Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
CyberGirl
Oct 28, 2020
Awesome podcast to help you stay up to date on the latest cyber threats and advances in tech.
| Episode | Date |
|---|---|
|
Excel-lerating cyberattacks.
|
Dec 27, 2025 |
|
The lies that let AI run amok.
|
Dec 20, 2025 |
|
Root access to the great firewall.
|
Dec 13, 2025 |
|
When macOS gets frostbite.
|
Dec 06, 2025 |
|
A new stealer hiding behind AI hype.
|
Nov 29, 2025 |
|
Two RMMs walk into a phish…
|
Nov 22, 2025 |
|
When clicks turn criminal.
|
Nov 15, 2025 |
|
A fine pearl gone rusty.
|
Nov 08, 2025 |
|
Attack of the automated ops.
|
Nov 01, 2025 |
|
A look behind the lens.
|
Oct 25, 2025 |
|
Smile for the malware.
|
Oct 18, 2025 |
|
No honor among thieves.
|
Oct 11, 2025 |
|
China’s stealthiest spy operation yet.
|
Oct 04, 2025 |
|
Inside Curly COMrades.
|
Sep 27, 2025 |
|
Browser attacks without downloads.
|
Sep 20, 2025 |
|
Data leak without a click.
|
Sep 13, 2025 |
|
Don’t trust that app!
|
Sep 06, 2025 |
|
Cracks in the wall.
|
Aug 30, 2025 |
|
Beyond the smoke screen.
|
Aug 23, 2025 |
|
The CVE countdown clock.
|
Aug 16, 2025 |
|
When malware plays pretend.
|
Aug 09, 2025 |
|
nOAuth-ing to see here.
|
Aug 02, 2025 |
|
Muddled Libra: From Spraying to Preying in 2025 [Threat Vector]
|
Jul 26, 2025 |
|
Creeping like a spider.
|
Jul 19, 2025 |
|
Click here to steal.
|
Jul 12, 2025 |
|
Botnet’s back, tell a friend.
|
Jul 05, 2025 |
|
A tale of two botnets.
|
Jun 28, 2025 |
|
Signed, sealed, exploitable.
|
Jun 21, 2025 |
|
Hiding in plain sight with vibe coding.
|
Jun 14, 2025 |
|
A new stealer hiding behind AI hype.
|
Jun 07, 2025 |
|
Triofox and the key to disaster.
|
May 31, 2025 |
|
Pandas with a purpose.
|
May 24, 2025 |
|
Leveling up their credential phishing tactics.
|
May 17, 2025 |
|
Hijacking wallets with malicious patches.
|
May 10, 2025 |
|
When AI gets a to-do list.
|
May 03, 2025 |
|
China’s new cyber arsenal revealed.
|
Apr 26, 2025 |
|
Crafting malware with modern metals.
|
Apr 19, 2025 |
|
The new malware on the block.
|
Apr 12, 2025 |
|
Bybit’s $1.4B breach.
|
Apr 05, 2025 |
|
Breaking barriers, one byte at a time.
|
Mar 29, 2025 |
|
Excel-lerating cyberattacks.
|
Mar 22, 2025 |
|
The ransomware clones of HellCat & Morpheus.
|
Mar 15, 2025 |
|
Botnet’s back, tell a friend.
|
Mar 08, 2025 |
|
Caught in the contagious interview.
|
Mar 01, 2025 |
|
From small-time scams to billion-dollar threats.
|
Feb 22, 2025 |
|
Bot or not? The fake CAPTCHA trick spreading Lumma malware.
|
Feb 15, 2025 |
|
Cleo’s trojan horse.
|
Feb 08, 2025 |
|
A Digital Eye on supply-chain-based espionage attacks.
|
Feb 01, 2025 |
|
LightSpy's dark evolution.
|
Jan 25, 2025 |
|
A cute cover for a dangerous vulnerability.
|
Jan 18, 2025 |
|
The hidden cost of data hoarding.
|
Jan 11, 2025 |
|
Crypto client or cyber trap?
|
Jan 04, 2025 |
|
On the prowl for mobile malware.
|
Dec 28, 2024 |
|
Quishing for trouble.
|
Dec 21, 2024 |
|
Watching the watchers. IoT vulnerabilities exposed by AI.
|
Dec 14, 2024 |
|
The JPHP loader breaking away from the pack.
|
Dec 07, 2024 |
|
Leaking your AWS API keys, on purpose?
|
Nov 30, 2024 |
|
Exposing AI's Achilles heel.
|
Nov 23, 2024 |
|
Credential harvesters in the cloud.
|
Nov 16, 2024 |
|
A firewall wake up call.
|
Nov 09, 2024 |
|
Velvet Ant's silent invasion.
|
Nov 02, 2024 |
|
LLM security 101.
|
Oct 26, 2024 |
|
New targets, new tools, same threat.
|
Oct 19, 2024 |
|
Ransomware on repeat.
|
Oct 12, 2024 |
|
Podcast bait, malware switch.
|
Oct 05, 2024 |
|
Beyond the permissions wall.
|
Sep 28, 2024 |
|
Hook, line, and sinker.
|
Sep 21, 2024 |
|
Spamageddon: Xeon Sender’s cloudy SMS attack revealed!
|
Sep 14, 2024 |
|
The playbook for outpacing China.
|
Sep 07, 2024 |
|
Pop goes the developer.
|
Aug 31, 2024 |
|
MaaS infrastructure exposed.
|
Aug 24, 2024 |
|
Essential tools with critical security challenges.
|
Aug 17, 2024 |
|
Prompts gone rogue.
|
Aug 10, 2024 |
|
Spinning the web of tangled tactics.
|
Aug 03, 2024 |
|
The Black Basta ransomware riddle.
|
Jul 27, 2024 |
|
Olympic scammers go for gold.
|
Jul 20, 2024 |
|
On the prowl for mobile malware.
|
Jul 13, 2024 |
|
Encore: Welcome to New York, it's been waitin' for you.
|
Jul 06, 2024 |
|
APT36's cyber blitz on India.
|
Jun 29, 2024 |
|
Piercing the through the fog.
|
Jun 22, 2024 |
|
Exploring the mechanics of Infostealer malware.
|
Jun 15, 2024 |
|
Riding the hype for new Arc browser.
|
Jun 08, 2024 |
|
1700 IPs and counting.
|
Jun 01, 2024 |
|
International effort dismantles LockBit.
|
May 25, 2024 |
|
From secret images to encryption keys.
|
May 18, 2024 |
|
The double-edged sword of cyber espionage.
|
May 11, 2024 |
|
Geopolitical tensions rise with China.
|
May 04, 2024 |
|
Cerber ransomware strikes Linux.
|
Apr 27, 2024 |
|
The art of information gathering.
|
Apr 20, 2024 |
|
Breaking down a high-severity vulnerability in Kubernetes.
|
Apr 13, 2024 |
|
Leaking your AWS API keys, on purpose?
|
Apr 06, 2024 |
|
The supply chain in disarray.
|
Mar 30, 2024 |
|
HijackLoader unleashed: Evolving threats and sneaky tactics.
|
Mar 23, 2024 |
|
Inside SendGrid's phishy business.
|
Mar 16, 2024 |
|
Understanding the multi-tiered impact of ransomware.
|
Mar 09, 2024 |
|
The return of a malware menace.
|
Mar 02, 2024 |
|
Web host havoc: Unveiling the Manic Menagerie campaign.
|
Feb 24, 2024 |
|
Hackers come hopping back.
|
Feb 17, 2024 |
|
Ransomware is coming.
|
Feb 10, 2024 |
|
Weathering the internet storm.
|
Feb 03, 2024 |
|
Hooked on pirated macOS applications.
|
Jan 27, 2024 |
|
A firewall wake up call.
|
Jan 20, 2024 |
|
Dual Russian cyber gangs hit 23 companies.
|
Jan 13, 2024 |
|
Diving deep into Phobos ransomware.
|
Jan 06, 2024 |
|
Encore: What malicious campaign is lurking under the surface?
|
Dec 30, 2023 |
|
Encore: Compromised military tech?
|
Dec 23, 2023 |
|
Shedding light on fighting Ursa.
|
Dec 16, 2023 |
|
On the hunt for popping up kernel drives.
|
Dec 09, 2023 |
|
Exploits and vulnerabilities.
|
Dec 02, 2023 |
|
Encore: Another infection with new malware.
|
Nov 25, 2023 |
|
The malicious YoroTrooper in disguise.
|
Nov 18, 2023 |
|
Encore: Old malware returns in a new way.
|
Nov 11, 2023 |
|
Sandman doesn't slow malware down.
|
Nov 04, 2023 |
|
No rest for the wicked HiatusRAT.
|
Oct 28, 2023 |
|
AMBERSQUID hides in the depths.
|
Oct 21, 2023 |
|
Unwanted guests harvest your information.
|
Oct 14, 2023 |
|
Targets from DuckTail.
|
Oct 07, 2023 |
|
Downloading cracked software.
|
Sep 30, 2023 |
|
Behind the Google shopping ad masks.
|
Sep 23, 2023 |
|
A look into the emotions and anxieties of the highest levels of decision-making.
|
Sep 16, 2023 |
|
No honor in being a criminal.
|
Sep 09, 2023 |
|
Thwarting Muddled Libra.
|
Sep 02, 2023 |
|
Google's not being ghosted from vulnerabilities.
|
Aug 26, 2023 |
|
Politicians targeted by RomCom.
|
Aug 19, 2023 |
|
It's raining credentials.
|
Aug 12, 2023 |
|
Who is that stealing my credentials?
|
Aug 05, 2023 |
|
Phishing for leeches.
|
Jul 29, 2023 |
|
Welcome to New York, it's been waitin' for you.
|
Jul 22, 2023 |
|
SCARLETEEL zaps back again.
|
Jul 15, 2023 |
|
Creating PANDA-monium.
|
Jul 08, 2023 |
|
The power behind artificial intelligence.
|
Jul 01, 2023 |
|
Unleashing the crypto gold rush.
|
Jun 24, 2023 |
|
Managing machine learning risks.
|
Jun 17, 2023 |
|
A new botnet takes a frosty bite out of the gaming industry.
|
Jun 10, 2023 |
|
Lancefly screams bloody Merdoor.
|
Jun 03, 2023 |
|
8 GoAnywhere MFT breaches and counting.
|
May 27, 2023 |
|
Dangerous vulnerabilities in H.264 decoders.
|
May 20, 2023 |
|
Running away from operation Tainted Love.
|
May 13, 2023 |
|
Phishing campaign takes the energy out of Chinese nuclear industry.
|
May 06, 2023 |
|
HinataBot focuses on DDoS attack.
|
Apr 29, 2023 |
|
Don't let the Elon Musk crypto giveaway scam swindle you.
|
Apr 22, 2023 |
|
New Dero cryptojacking operation concentrates on locating Kubernetes.
|
Apr 15, 2023 |
|
A dark side to LLMs.
|
Apr 08, 2023 |
|
Blackfly flies back again.
|
Apr 01, 2023 |
|
Popunders are not the good kind of ads.
|
Mar 25, 2023 |
|
ChatGPT grants malicious wishes?
|
Mar 18, 2023 |
|
Files stolen from a sneaky SymStealer.
|
Mar 11, 2023 |
|
New exploits are tricking Chrome.
|
Mar 04, 2023 |
|
The next hot AI scam.
|
Feb 25, 2023 |
|
Implementing and achieving security resilience.
|
Feb 18, 2023 |
|
Knocking down the legs of the industrial security triad.
|
Feb 11, 2023 |
|
Can ransomware turn machines against us?
|
Feb 04, 2023 |
|
Flagging firmware vulnerabilities.
|
Jan 28, 2023 |
|
Billbug infests government agencies.
|
Jan 21, 2023 |
|
DUCKTAIL waddles back again.
|
Jan 14, 2023 |
|
Stealer malware from Russia.
|
Jan 07, 2023 |
|
Encore: LemonDucks evading detection.
|
Dec 31, 2022 |
|
Encore: Vulnerabilities in IoT devices.
|
Dec 24, 2022 |
|
Hijacking holiday spirit with phishing scams.
|
Dec 17, 2022 |
|
Cybersecurity during the World Cup.
|
Dec 10, 2022 |
|
Old malware returns in a new way.
|
Dec 03, 2022 |
|
Encore: The secrets behind Docker.
|
Nov 26, 2022 |
|
Another infection with new malware.
|
Nov 19, 2022 |
|
An in-depth look on the Crytox ransomware family.
|
Nov 12, 2022 |
|
Over-the-air 0-day vulnerabilities.
|
Nov 05, 2022 |
|
Bugs and working from home.
|
Oct 29, 2022 |
|
New tools target governments in Middle East?
|
Oct 22, 2022 |
|
Noberus ransomware: evolving tactics.
|
Oct 15, 2022 |
|
Google Drive used for malware?
|
Oct 08, 2022 |
|
Targeting your browser bookmarks?
|
Oct 01, 2022 |
|
Keeping an eye on RDS vulnerabilities.
|
Sep 24, 2022 |
|
An increase in bypassing bot management?
|
Sep 17, 2022 |
|
Evilnum APT returns with new targets.
|
Sep 10, 2022 |
|
LockBit's contradiction on encryption speed.
|
Sep 03, 2022 |
|
How a wide scale Facebook campaign stole 1 million credentials.
|
Aug 27, 2022 |
|
Clipminer: Making millions off of malware.
|
Aug 20, 2022 |
|
Fake job ads and how to spot them.
|
Aug 13, 2022 |
|
Iran-linked Lyceum Group adds a new weapon to its arsenal.
|
Aug 06, 2022 |
|
What malicious campaign is lurking under the surface?
|
Jul 30, 2022 |
|
Has GOLD SOUTHFIELD resumed operations?
|
Jul 23, 2022 |
|
A record breaking DDoS attack.
|
Jul 16, 2022 |
|
Information operations during a war.
|
Jul 09, 2022 |
|
Could REvil have a copycat?
|
Jul 02, 2022 |
|
Lazarus Targets Chemical Sector With 'Dream Job.'
|
Jun 25, 2022 |
|
Dissecting the Spring4Shell vulnerability.
|
Jun 18, 2022 |
|
New developments in the WSL attack.
|
Jun 11, 2022 |
|
LemonDucks evading detection.
|
Jun 04, 2022 |
|
Compromised military tech?
|
May 28, 2022 |
|
AutoWarp bug leads to Automation headaches.
|
May 21, 2022 |
|
Vulnerabilities in IoT devices.
|
May 14, 2022 |
|
Vulnerabilities bring in the hackers.
|
May 07, 2022 |
|
Attackers coming in from the Backdoor?
|
Apr 30, 2022 |
|
BABYSHARK is swimming again!
|
Apr 23, 2022 |
|
A fight to defend Taiwan financial institutions.
|
Apr 16, 2022 |
|
The secrets behind Docker.
|
Apr 09, 2022 |
|
A popular malware scheme and pay-per-install services.
|
Apr 02, 2022 |
|
The breakdown of Shuckworm's continued cyber attacks against Ukraine.
|
Mar 26, 2022 |
|
Implications of data leaks of sensitive OT information.
|
Mar 19, 2022 |
|
The story of REvil: From origin to beyond.
|
Mar 12, 2022 |
|
An abuse of trust: Potential security issues with open redirects.
|
Mar 05, 2022 |
|
Noberus ransomware: Coded in Rust and tailored to victim.
|
Feb 26, 2022 |
|
Instagram hijacks all start with a phish.
|
Feb 19, 2022 |
|
SysJoker backdoor masquerades as benign updates.
|
Feb 12, 2022 |
|
The persistent and patient nature of advanced threat actors.
|
Feb 05, 2022 |
|
Use of legitimate tools possibly linked to Seedworm.
|
Jan 29, 2022 |
|
A collaboration stumbles upon threat actor Lyceum.
|
Jan 22, 2022 |
|
Keeping APIs on the radar: Evaluating the banking industry.
|
Jan 15, 2022 |
|
The rise of Karakurt Hacking Team.
|
Jan 08, 2022 |
|
Encore: When big ransomware goes away, where should affiliates go?
|
Jan 01, 2022 |
|
CyberWire Pro Research Briefing from 12/21/2021.
|
Dec 25, 2021 |
|
Discovering ChaosDB, a critical vulnerability in the CosmosDB.
|
Dec 18, 2021 |
|
FIN7 repositioning focus into ransomware.
|
Dec 11, 2021 |
|
Getting in and getting out with SnapMC.
|
Dec 04, 2021 |
|
CyberWire Pro Research Briefing from 11/23/2021
|
Nov 27, 2021 |
|
Using bidirectionality override characters to obscure code.
|
Nov 20, 2021 |
|
A glimpse into TeamTNT.
|
Nov 13, 2021 |
|
An incident response reveals itself as GhostShell tool, ShellClient.
|
Nov 06, 2021 |
|
Malware sometimes changes its behavior.
|
Oct 30, 2021 |
|
When big ransomware goes away, where should affiliates go?
|
Oct 23, 2021 |
|
Groove Gang making a name for themselves.
|
Oct 16, 2021 |
|
Taking a closer look at UNC1151.
|
Oct 09, 2021 |
|
IoT security and the need for randomness.
|
Oct 02, 2021 |
|
Vulnerabilities in the public cloud.
|
Sep 25, 2021 |
|
An IoT educational exercise reveals a far-reaching vulnerability.
|
Sep 18, 2021 |
|
A Google Chrome update that just didn't feel right.
|
Sep 11, 2021 |
|
Like a computer network but for physical objects.
|
Sep 04, 2021 |
|
Joker malware family: not a joke for Google Play.
|
Aug 28, 2021 |
|
Exploring vulnerabilities of off-the-shelf software.
|
Aug 21, 2021 |
|
You can add new features, just secure the old stuff first.
|
Aug 14, 2021 |
|
SideCopy malware campaigns expand and evolve.
|
Aug 07, 2021 |
|
China's influence grows through Digital Silk Road Initiative.
|
Jul 31, 2021 |
|
Free malware with cracked software.
|
Jul 24, 2021 |
|
Enabling connectivity enables exposures.
|
Jul 17, 2021 |
|
Dealing illicit goods on encrypted chat apps.
|
Jul 10, 2021 |
|
Malware in pirated Windows installation files.
|
Jul 03, 2021 |
|
Exhibiting advanced APT-like behavior.
|
Jun 26, 2021 |
|
Primitive Bear spearphishes for Ukrainian entities.
|
Jun 19, 2021 |
|
Taking a look behind the Science of Security.
|
Jun 12, 2021 |
|
Bad building blocks: a new and unusual phishing campaign.
|
Jun 05, 2021 |
|
EtterSilent: a popular, versatile maldoc builder.
|
May 29, 2021 |
|
Leveraging COVID-19 themes for malicious purposes.
|
May 22, 2021 |
|
Jack Voltaic: critical infrastructure resiliency project, not a person.
|
May 15, 2021 |
|
SUPERNOVA activity and its possible connection to SPIRAL threat group.
|
May 08, 2021 |
|
A snapshot of the ransomware threat landscape.
|
May 01, 2021 |
|
Bulletproof hosting (BPH) and how it powers cybercrime.
|
Apr 24, 2021 |
|
Social engineering: MINEBRIDGE RAT embedded to look like job résumés.
|
Apr 17, 2021 |
|
Strategic titles point to something more than a commodity campaign.
|
Apr 10, 2021 |
|
Ezuri: Regenerating a different kind of target.
|
Apr 03, 2021 |
|
How are we doing in the industrial sector?
|
Mar 27, 2021 |
|
BendyBear: difficult to detect and downloader of malicious payloads.
|
Mar 20, 2021 |
|
Keeping data confidential with fully homomorphic encryption.
|
Mar 13, 2021 |
|
Diving deep into North Korea's APT37 tool kit.
|
Mar 06, 2021 |
|
Shining a light on China's cyber underground.
|
Feb 27, 2021 |
|
Attackers (ab)using Google Chrome.
|
Feb 20, 2021 |
|
Using the human body as a wire-like communication channel.
|
Feb 13, 2021 |
|
"Follow the money" the cybersecurity way.
|
Feb 06, 2021 |
|
The Kimsuky group from North Korea expands spyware, malware and infrastructure.
|
Jan 30, 2021 |
|
Trickbot may be down, but can we count it out?
|
Jan 23, 2021 |
|
Manufacturing sector is increasingly a target for adversaries.
|
Jan 16, 2021 |
|
Emotet reemerges and becomes one of most prolific threat groups out there.
|
Jan 09, 2021 |
|
Encore: Unpacking the Malvertising Ecosystem. [Research Saturday]
|
Jan 02, 2021 |
|
Encore: Seedworm digs Middle East intelligence. [Research Saturday]
|
Dec 26, 2020 |
|
Advertising Software Development Kit (SDK): serving up more than just in-app ads and logging sensitive data.
|
Dec 19, 2020 |
|
Following DOJ indictment, a look back on NotPetya and Olympic Destroyer research.
|
Dec 12, 2020 |
|
SSL-based threats remain prevalent and are becoming increasingly sophisticated.
|
Dec 05, 2020 |
|
Encore: Using global events as lures for malicious activity.
|
Nov 28, 2020 |
|
Misconfigured identity and access management (IAM) is much more widespread.
|
Nov 21, 2020 |
|
That first CVE was a fun find, for sure.
|
Nov 14, 2020 |
|
PoetRAT: a complete lack of operational security.
|
Nov 07, 2020 |
|
Leveraging for a bigger objective.
|
Oct 31, 2020 |
|
The Malware Mash!
|
Oct 30, 2020 |
|
Just saying there are attacks is not enough.
|
Oct 24, 2020 |
|
Intentionally not drawing attention.
|
Oct 17, 2020 |
|
It's still possible to find ways to break out.
|
Oct 10, 2020 |
|
Smaug: Ransomware-as-a-service drag(s)on.
|
Oct 03, 2020 |
|
What came first, the Golden Chickens or more_eggs?
|
Sep 26, 2020 |
|
Election 2020: What to expect when we are electing.
|
Sep 19, 2020 |
|
Leveraging legitimate tools.
|
Sep 12, 2020 |
|
Going after the most valuable data.
|
Sep 05, 2020 |
|
They fooled a lot of people.
|
Aug 29, 2020 |
|
Using global events as lures.
|
Aug 22, 2020 |
|
Waiting for their victims.
|
Aug 15, 2020 |
|
Like anything these days, you have to disinfect it first.
|
Aug 08, 2020 |
|
Detecting Twitter bots in real time.
|
Aug 01, 2020 |
|
It was only a matter of time.
|
Jul 25, 2020 |
|
Every time we get smarter, the bad guy changes something.
|
Jul 18, 2020 |
|
Are you running what you think you're running?
|
Jul 11, 2020 |
|
Enter the RAT.
|
Jun 27, 2020 |
|
Click here to update your webhook.
|
Jun 20, 2020 |
|
The value of the why and the who.
|
Jun 13, 2020 |
|
Due diligence cannot be done as a one-off.
|
Jun 06, 2020 |
|
Twofold snooping venture.
|
May 30, 2020 |
|
Naming and shaming is the worst thing we can do.
|
May 23, 2020 |
|
Gangnam Industrial Style APT campaign targets South Korea.
|
May 16, 2020 |
|
The U.S. campaign trail is actually quite secure.
|
May 09, 2020 |
|
Fingerprint authentication is not completely secure.
|
May 02, 2020 |
|
Contact tracing as COVID-19 aid.
|
Apr 25, 2020 |
|
How low can they go? A spike in Coronavirus phishing.
|
Apr 18, 2020 |
|
Profiling an audacious Nigerian cybercriminal.
|
Apr 11, 2020 |
|
A rough year ahead for ransomware attacks - and how to stop them.
|
Apr 04, 2020 |
|
Hidden dangers inside Windows and LINUX computers.
|
Mar 28, 2020 |
|
The security implications of cloud infrastructure in IoT.
|
Mar 21, 2020 |
|
TLS is here to stay.
|
Mar 14, 2020 |
|
Overworked developers write vulnerable software.
|
Mar 07, 2020 |
|
Application tracking in Wacom tablets.
|
Feb 29, 2020 |
|
New vulnerabilities in PC sound cards.
|
Feb 22, 2020 |
|
If you can't detect it, you can't steal it.
|
Feb 15, 2020 |
|
The Chameleon attacks Online Social Networks.
|
Feb 08, 2020 |
|
Tracking one of China's hidden hacking groups.
|
Feb 01, 2020 |
|
Know Thine Enemy - Identifying North American Cyber Threats.
|
Jan 25, 2020 |
|
Clever breaches demonstrate IoT security gaps.
|
Jan 18, 2020 |
|
Profiling the Linken Sphere anti-detection browser.
|
Jan 11, 2020 |
|
A Jira vulnerability that’s leaking data in the public cloud.
|
Jan 02, 2020 |
|
Inside Magecart and Genesis.
|
Dec 21, 2019 |
|
WAV files carry malicious data payloads.
|
Dec 14, 2019 |
|
Targeting routers to hit gaming servers.
|
Dec 07, 2019 |
|
Mustang Panda leverages Windows shortcut files.
|
Nov 23, 2019 |
|
Sodinokibi aka REvil connections to GandCrab.
|
Nov 16, 2019 |
|
Monitoring the growing sophistication of PKPLUG.
|
Nov 09, 2019 |
|
Usable security is a delicate balance.
|
Nov 02, 2019 |
|
Masad Steals via Social Media.
|
Oct 26, 2019 |
|
Hoping for SOHO security.
|
Oct 19, 2019 |
|
Decrypting ransomware for good.
|
Oct 12, 2019 |
|
The fuzzy boundaries of APT41.
|
Oct 05, 2019 |
|
Focusing on Autumn Aperture.
|
Sep 28, 2019 |
|
Leaky guest networks and covert channels.
|
Sep 21, 2019 |
|
Bluetooth blues: KNOB attack explained.
|
Sep 14, 2019 |
|
VOIP phone system harbors decade-old vulnerability.
|
Sep 07, 2019 |
|
Emotet's updated business model.
|
Aug 31, 2019 |
|
Gift card bots evolve and adapt.
|
Aug 24, 2019 |
|
Detecting dating profile fraud.
|
Aug 17, 2019 |
|
Unpacking the Malvertising Ecosystem.
|
Aug 10, 2019 |
|
Package manager repository malware detection.
|
Aug 03, 2019 |
|
Day to day app fraud in the Google Play store.
|
Jul 27, 2019 |
|
Nansh0u not your normal cryptominer.
|
Jul 20, 2019 |
|
Opportunistic botnets round up vulnerable routers.
|
Jul 13, 2019 |
|
Giving everyone a stake in the success of Open Source implementation.
|
Jun 29, 2019 |
|
Middleboxes may be meddling with TLS connections.
|
Jun 22, 2019 |
|
Apps on third-party Android store carry unwelcome code.
|
Jun 15, 2019 |
|
Xwo scans for default credentials and exposed web services.
|
Jun 08, 2019 |
|
Blockchain bandits plunder weak wallets.
|
Jun 01, 2019 |
|
A fresh look at GOSSIPGIRL and the Supra Threat Actors.
|
May 25, 2019 |
|
Elfin APT group targets Middle East energy sector.
|
May 18, 2019 |
|
Steganography enables sophisticated OceanLotus payloads.
|
May 11, 2019 |
|
Sea Turtle state-sponsored DNS hijacking.
|
May 04, 2019 |
|
Deep Learning threatens 3D medical imaging integrity.
|
Apr 27, 2019 |
|
Undetectable vote manipulation in SwissPost e-voting system.
|
Apr 20, 2019 |
|
Establishing software root of trust unconditionally.
|
Apr 13, 2019 |
|
Lessons learned from Ukraine elections.
|
Apr 06, 2019 |
|
Alarming vulnerabilities in automotive security systems.
|
Mar 30, 2019 |
|
Ryuk ransomware relationship revelations.
|
Mar 23, 2019 |
|
ThinkPHP exploit from Asia-Pacific region goes global.
|
Mar 16, 2019 |
|
Job-seeker exposes banking network to Lazurus Group.
|
Mar 09, 2019 |
|
Fake Fortnite app scams infect gamers.
|
Mar 02, 2019 |
|
Rosneft suspicions shift from espionage to business email compromise.
|
Feb 23, 2019 |
|
Seedworm digs Middle East intelligence.
|
Feb 16, 2019 |
|
Trends and tips for cloud security.
|
Feb 09, 2019 |
|
Online underground markets in the Middle East.
|
Feb 02, 2019 |
|
Amplification bots and how to detect them.
|
Jan 26, 2019 |
|
Luring IoT botnets to the honeypot.
|
Jan 19, 2019 |
|
Magecart payment card theft analysis.
|
Jan 12, 2019 |
|
NOKKI, Reaper and DOGCALL target Russians and Cambodians.
|
Jan 05, 2019 |
|
Apple Device Enrollment Program vulnerabilities explored.
|
Dec 22, 2018 |
|
The Sony hack and the perils of attribution.
|
Dec 15, 2018 |
|
Operation Red Signature targets South Korean supply chain.
|
Dec 08, 2018 |
|
Getting an education on Cobalt Dickens.
|
Dec 01, 2018 |
|
Doubling down on Cobalt Group activity.
|
Nov 17, 2018 |
|
Establishing international norms in cyberspace.
|
Nov 10, 2018 |
|
Election protection.
|
Nov 03, 2018 |
|
Faxploitation.
|
Oct 27, 2018 |
|
Stormy weather in the Office 365 cloud.
|
Oct 20, 2018 |
|
Driving GPS manipulation.
|
Oct 13, 2018 |
|
Cryptojacking criminal capers continue.
|
Oct 06, 2018 |
|
Sophisticated FIN7 criminal group hits payment card data.
|
Sep 29, 2018 |
|
ICS honeypots attract sophisticated snoops.
|
Sep 22, 2018 |
|
Android device eavesdropping investigation.
|
Sep 15, 2018 |
|
Leafminer espionage digs the Middle East.
|
Sep 08, 2018 |
|
ATM hacks on the rise.
|
Sep 01, 2018 |
|
Cyber espionage coming from Chinese University.
|
Aug 25, 2018 |
|
Stealthy ad fraud campaign evades detection.
|
Aug 18, 2018 |
|
Thrip espionage group lives off the land.
|
Aug 11, 2018 |
|
Cortana voice assistant lets you in.
|
Aug 04, 2018 |
|
BabaYaga strangely symbiotic Wordpress malware.
|
Jul 28, 2018 |
|
Measuring the spearphishing threat.
|
Jul 21, 2018 |
|
A new approach to mission critical systems.
|
Jul 14, 2018 |
|
No Distribute Scanners help sell malware.
|
Jul 07, 2018 |
|
VPNFilter malware could brick devices worldwide.
|
Jun 30, 2018 |
|
LG smartphone keyboard vulnerabilities.
|
Jun 23, 2018 |
|
Cyber bank heists.
|
Jun 16, 2018 |
|
Winnti Umbrella Chinese threat group.
|
Jun 09, 2018 |
|
Islamic State propaganda persistence.
|
Jun 02, 2018 |
|
UPnProxy infiltrates home routers.
|
May 26, 2018 |
|
Threat actors hijack Lojack.
|
May 19, 2018 |
|
Three pillars of Artificial Intelligence.
|
May 12, 2018 |
|
BlackTDS and ThreadKit offered in criminal markets.
|
May 05, 2018 |
|
New MacOS backdoor linked to OceanLotus.
|
Apr 28, 2018 |
|
InnaputRAT exfiltrates victim data.
|
Apr 21, 2018 |
|
Energetic Dragonfly and DYMALLOY Bear 2.0.
|
Apr 14, 2018 |
|
Crypto crumple zones.
|
Apr 07, 2018 |
|
Chasing FlawedAMMYY.
|
Mar 31, 2018 |
|
Code comments cause SAML conundrum.
|
Mar 24, 2018 |
|
Cryptojacking injections heat up.
|
Mar 17, 2018 |
|
Dark Caracal APT steals out of Lebanon.
|
Mar 10, 2018 |
|
Lebal malware phishes for victims.
|
Mar 03, 2018 |
|
Phishing for holiday winnings.
|
Feb 24, 2018 |
|
The uncanny HEX men.
|
Feb 17, 2018 |
|
IcedID banking trojan.
|
Feb 10, 2018 |
|
Advanced adware with nation-state tactics.
|
Feb 03, 2018 |
|
Targeting Olympic organizations.
|
Jan 27, 2018 |
|
Fancy Bear Duping Doping Domains.
|
Jan 20, 2018 |
|
Shake Your MoneyTaker.
|
Jan 13, 2018 |
|
TRISIS Malware: Fail-safe fail.
|
Jan 06, 2018 |
|
Hunting the Sowbug.
|
Dec 30, 2017 |
|
Keyboys back in town.
|
Dec 23, 2017 |
|
The unique culture of the Middle Eastern and North African underground.
|
Dec 16, 2017 |
|
Stealthy Zberp Banking Trojan.
|
Dec 09, 2017 |
|
Staying ahead of Fast Flux Networks.
|
Dec 02, 2017 |
|
Waiting for Terdot, a sneaky banking Trojan.
|
Nov 25, 2017 |
|
Dark Net Pricing with Flashpoint's Liv Rowley.
|
Nov 18, 2017 |
|
Taiwan Bank Heist and Lazurus Group with BAE's Adrian Nish.
|
Nov 11, 2017 |
|
Exploring Phishing Kits with Duo Security's Jordan Wright.
|
Nov 04, 2017 |
|
Tracking a Trojan: KHRAT.
|
Oct 28, 2017 |
|
WireX BotNet with Justin Paine from Cloudflare.
|
Oct 21, 2017 |
|
Synthesized DNA Malware with Peter Ney.
|
Oct 14, 2017 |
|
Android Toast Overlay: Ryan Olson from Palo Alto Networks.
|
Oct 07, 2017 |
|
APT 33: FireEye's John Hultquist on an Iranian Cyber Espionage Group.
|
Sep 30, 2017 |
|
Pacifier APT : Bitdefender's Liviu Arsene describes a sophisticated, multifaceted malware campaign.
|
Sep 23, 2017 |
|
Cobian RAT: Zscaler’s Deepen Desai describes some clever malware.
|
Sep 16, 2017 |