Exposing a Portfolio of Pay Per Install Rogue and Fraudulent and Malicious Affiliate Network Domains - An OSINT Analysis

Exposing a Portfolio of Pay Per Install Rogue and Fraudulent and Malicious Affiliate Network Domains – An OSINT Analysis

 Dear blog readers,I've decided to share with everyone an in-depth historical OSINT analysis on some of the primary pay per install rogue fraudulent and malicious affiliate network based rogue and fraudulent revenue ...
™

4 Phishing Attacks that Exploit Two-Factor Authentication (2FA)

Earlier this year, we posted a blog on Two-Factor Authentication (2FA). In it, we ... The post 4 Phishing Attacks that Exploit Two-Factor Authentication (2FA) appeared first on SlashNext ...
Prison for man who assisted scareware scheme that targeted newspaper website

Prison for man who assisted scareware scheme that targeted newspaper website

A man wanted for his part in a lucrative criminal operation that spread scareware via the Minnesota Star Tribune website, who spent years on the run from the FBI, has finally been ...
Big Time Crooks

Big Time Crooks

When an online scam becomes too successful, the results can be farcical. In the movie Small Time Crooks, Woody Allen leads an inept gang of would-be robbers who rent a store next ...
phishing cybersecurity

Fancy Bear Cyberspies Hide Phishing Pages Behind Blogspot Links

Security researchers have identified a new phishing campaign launched by Russian cyberespionage group Fancy Bear that uses rogue blogspot.com URLs to bypass spam filters. These latest attacks were aimed at Bellingcat, a ...