Blog

Blog
Law Enforcement Disrupts Botnet Operation Utilizing Compromised Routers for Residential Proxy Services

Law enforcement authorities have successfully disrupted a botnet that has compromised thousands of routers over the past 20 years, leading…

Blog
Google Chrome Implements AI Technology to Combat Tech Support Scam Websites

Google is advancing its efforts to combat tech support scams through the integration of Artificial Intelligence (AI) within the Chrome…

Blog
Important Update: Dismantling of 7,000-Device IoT and EoL System Proxy Botnet in U.S. Executed by Dutch Authorities

A coordinated operation conducted by Dutch and U.S. law enforcement agencies has successfully dismantled a significant criminal proxy network comprised…

Blog
OtterCookie v4 Introduces Enhanced Virtual Machine Detection and Advanced Credential Theft Features for Chrome and MetaMask

The North Korean threat actors behind the Contagious Interview campaign have been observed employing upgraded versions of a cross-platform malware…

Blog
Chinese Cyber Actors Target SAP NetWeaver Servers in Coordinated Attack

Forescout Vedere Labs security researchers have identified a series of ongoing attacks exploiting a critical vulnerability in SAP NetWeaver servers,…

Blog
Advanced Phishing Attack Exploits Blob URIs to Display Deceptive Login Pages in Browsers

Cofense Intelligence has identified an innovative phishing technique that employs blob URIs to generate fraudulent local login pages, effectively circumventing…