Legitimate software apps impersonated in a blackhat SEO-friendly PUA (Potentially Unwanted Application) serving campaign by Blog Staff | May 2, 2014 | Industry Intel, Threat Lab Reading Time: ~ 3 min.
All About Windows Tech Support Scams by Blog Staff | May 1, 2014 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Fake Reviews Trick Google Play Users by Blog Staff | Apr 22, 2014 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Managed DDoS WordPress-targeting, XML-RPC API abusing service, spotted in the wild by Blog Staff | Mar 31, 2014 | Industry Intel, Threat Lab Reading Time: ~ 3 min.
DIY automatic cybercrime-friendly ‘redirector generating’ service spotted in the wild – part two by Blog Staff | Mar 28, 2014 | Industry Intel, Threat Lab Reading Time: ~ 4 min.
Deceptive ads expose users to the Adware.Linkular/Win32.SpeedUpMyPC.A PUAs (Potentially Unwanted Applications) by Blog Staff | Mar 25, 2014 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Commercially available database of 52M+ ccTLD zone transfer domains spotted in the wild by Blog Staff | Mar 24, 2014 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Managed anti-forensics IMEI modification services fuel growth in the non-attributable TDoS market segment by Blog Staff | Mar 21, 2014 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
A peek inside a modular, Tor C&C enabled, Bitcoin mining malware bot by Blog Staff | Mar 20, 2014 | Industry Intel, Threat Lab Reading Time: ~ 3 min.
Socks4/Socks5 enabled hosts as a service introduces affiliate network based revenue sharing scheme by Blog Staff | Mar 19, 2014 | Industry Intel, Threat Lab Reading Time: ~ 3 min.
5M+ harvested Russian mobile numbers service exposes fraudulent infrastructure by Blog Staff | Mar 18, 2014 | Industry Intel, Threat Lab Reading Time: ~ 4 min.
Multiple spamvertised bogus online casino themed campaigns intercepted in the wild by Blog Staff | Mar 14, 2014 | Industry Intel, Threat Lab Reading Time: ~ 2 min.