In a digital world where advertising is king, businesses and organisations are not the only ones using this powerful tool. Cybercriminals have a knack for exploiting the engine that powers online platforms by corrupting the vast reach of advertising to distribute malware en masse.
While legitimate businesses rely on ads to reach new audiences, hackers exploit these platforms to trick users into downloading harmful software. Malicious ads often seem to promote legitimate software, streaming services, or products, making it difficult for users to distinguish between safe and dangerous content.
Bitdefender Labs has been tracking malvertising for years, analysing how cybercriminals use these tactics to ...
The Voice of Cyberยฎ
Threat Intelligence
Threat Intelligence is a cornerstone of effective cybersecurity involving the collection, analysis, and dissemination of information about potential cyber threats to inform decision-making and enhance an organisation’s security posture. Threat intelligence encompasses data on emerging vulnerabilities, attack techniques, and the tactics employed by threat actors.
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
Modern businesses focussed on third-party cyber risk reduction require both a more comprehensive solution to third-party cyber risk; one that fully manages risk by rapidly ...
As the energy sector continues to embrace technology, cybersecurity needs to be prioritised. This requires investment in secure infrastructure, training programs, and skilled ...
Comment and Q&A from Satnam Narang, sr. staff research engineer at Tenable on CVE-2022-38028: GooseEgg EoP Exploit
IP address spoofingย involves creating Internet Protocol (IP) packets with a fake source IP address. This is typically done with the intention of deceiving the recipient into ...
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. Think ...
Ransomware attacks have been spreading like wildfire, infiltrating various sectors and leaving devastation in their wake. While industries like finance, critical ...
In The News
Sort By
- Date
- Title
Predicting the future isnโt easy, but you can anticipate what is likely to happen by looking at how things have evolved over the past year. This year again, Barracuda asked ...
The ASD just released its Annual Cyber Threat Report and some of the incidents outlined were the result of exploiting public-facing applications and compromised accounts or ...
On Tuesday, November 19, 2024, Adam Meyers, CrowdStrike Senior Vice President of Counter Adversary Operations, willย testifyย in front of the U.S. Senate Judiciary Subcommittee ...
Tenable, the exposure management company, has disclosed that its Tenable Cloud Security Research team has uncovered new attack techniques in Domain-Specific Languages (DSLs) ...
Arctic Wolfยฎ, a global leader in security operations, today announced the expansion of theย Arctic Wolf AuroraTMย Platformย with the addition of Arctic Wolf Threat Intelligence, ...
The bot landscape is changing. Malicious โ or bad bots โ are evolving to become more advanced and human-like in their behavior, while an emerging category of AI bots, which ...
Podcasts On Threat Intelligence
No results found.