Activists have traditionally used physical signs and catchy slogans to promote their political agenda, but the internet offers a significantly broader audience, so these activities have since moved online.
The Middle Eastern and North African (MENA) underground is characterized by its ironic mix of ideology and felony. We take a look at its inner workings, available wares, and the unique sense of brotherhood shared by its players. Read more
ATM malware has become a mainstay in many cybercriminals’ arsenal due to its capability to steal money. In our joint efforts with Europol’s EC3, we explain in detail how criminals continue to leverage different ATM malware families and attack types. Read more
This research paper explores the tools and methods used to spread fake news and manipulate public opinion: the services that enable them, their appearance on social media sites, and the motivations behind these activities. Read more
A complete discussion of the different vulnerability categories, including case studies of vulnerable SCADA HMIs. The paper also provides a guide for vulnerability researchers, as well as vendors on quick and efficient bug discovery. Read more
In 2012, we predicted that we would soon see an African underground market take root. Our recent joint research effort with the INTERPOL on the West African threat landscape may just be even greater proof of that. Read more