In a digital world where advertising is king, businesses and organisations are not the only ones using this powerful tool. Cybercriminals have a knack for exploiting the engine that powers online platforms by corrupting the vast reach of advertising to distribute malware en masse.
While legitimate businesses rely on ads to reach new audiences, hackers exploit these platforms to trick users into downloading harmful software. Malicious ads often seem to promote legitimate software, streaming services, or products, making it difficult for users to distinguish between safe and dangerous content.
Bitdefender Labs has been tracking malvertising for years, analysing how cybercriminals use these tactics to ...
The Voice of Cyberยฎ
Threat Intelligence
Threat Intelligence is a cornerstone of effective cybersecurity involving the collection, analysis, and dissemination of information about potential cyber threats to inform decision-making and enhance an organisation’s security posture. Threat intelligence encompasses data on emerging vulnerabilities, attack techniques, and the tactics employed by threat actors.
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
On September 23rd, Twitter userย Simone Margaritelli (@evilsocket) announcedย that he has discovered and privately disclosed a CVSS 9.9 GNU/Linux unauthenticated RCE, which ...
Cyber Security Awareness Month highlights the need for individual responsibility to secure their own account and devices. Beyond foundational measures, businesses need ...
Discover how insider threat incidents like the Avis cyberattack challenge organizations and how strategies like microsegmentation can help.
Company analysed 50 Trillion data points over two decades to identify critical vulnerabilities
Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help.
The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware ...
In The News
Sort By
- Date
- Title
The ASD just released its Annual Cyber Threat Report and some of the incidents outlined were the result of exploiting public-facing applications and compromised accounts or ...
On Tuesday, November 19, 2024, Adam Meyers, CrowdStrike Senior Vice President of Counter Adversary Operations, willย testifyย in front of the U.S. Senate Judiciary Subcommittee ...
Tenable, the exposure management company, has disclosed that its Tenable Cloud Security Research team has uncovered new attack techniques in Domain-Specific Languages (DSLs) ...
Arctic Wolfยฎ, a global leader in security operations, today announced the expansion of theย Arctic Wolf AuroraTMย Platformย with the addition of Arctic Wolf Threat Intelligence, ...
The bot landscape is changing. Malicious โ or bad bots โ are evolving to become more advanced and human-like in their behavior, while an emerging category of AI bots, which ...
Barracuda threat researchers have identified evolving tactics being used by cybercriminals in targeted sextortion scams. Criminals are now frequently using victimsโ addresses ...
Podcasts On Threat Intelligence