Cybercriminals populate Scribd with bogus adult content, spread malware using...
On their way to convert legitimate traffic into malware-infected hosts using web malware exploitation kits, cybercriminals have been actively experimenting with multiple traffic acquisition techniques...
View ArticleHow fraudulent blackhat SEO monetizers apply Quality Assurance (QA) to their...
How are cybercriminals most commonly abusing legitimate Web traffic? On the majority of occasions, some will either directly embed malicious iFrames on as many legitimate Web sites as possible, target...
View ArticleCybercrime-friendly underground traffic exchange helps facilitate fraudulent...
Throughout the last couple of years, the persistent demand for geolocated traffic coming from both legitimate traffic exchanges or purely malicious ones — think traffic acquisition through illegally...
View ArticleA peek inside a Blackhat SEO/cybercrime-friendly doorways management platform
The perceived decline in the use of blackhat SEO (search engine optimization) tactics for delivering malicious/fraudulent content over the last couple of years, does not necessarily mean that...
View ArticleCommercially available Blackhat SEO enabled multi-third-party product...
Standardization is the cybercrime ecosystem’s efficiency-oriented mentality to the general business ‘threat’ posed by inefficiencies and lack of near real-time capitalization on (fraudulent/malicious)...
View ArticleNewly launched VDS-based cybercrime-friendly hosting provider helps...
Realizing the market segment potential of bulletproof hosting services in a post-Russian Business Network (RBN) world — although it can be easily argued that as long as its operators are at large they...
View ArticleCommercial Windows-based compromised Web shells management application...
For years, whenever I needed a fresh sample of pharmaceutical scams, I always sampled the Web sites of major educational institutions, where a thriving ecosystem relying on compromised Web shells,...
View ArticleCybercrime Trends 2013 – Year in Review
It’s that time of the year! The moment when we reflect back on the cybercrime tactics, techniques and procedures (TTPs) that shaped 2013, in order to constructively speculate on what’s to come for 2014...
View ArticleGoogle’s reCAPTCHA under automatic fire from a newly launched...
It can be easily argued, that CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart), is the modern day’s ‘guardian of the Web’, in the context of preventing the mass,...
View ArticleCommercially available database of 52M+ ccTLD zone transfer domains spotted...
For years, cybercriminals have been building ‘hit lists’of potential targets through automated and efficiency-oriented reconnaissance TTPs (tactics, techniques and procedures). The aim is to...
View ArticleA peek inside a Blackhat SEO/cybercrime-friendly doorways management platform
The perceived decline in the use of blackhat SEO (search engine optimization) tactics for delivering malicious/fraudulent content over the last couple of years, does not necessarily mean that...
View ArticleCommercially available Blackhat SEO enabled multi-third-party product...
Standardization is the cybercrime ecosystem’s efficiency-oriented mentality to the general business ‘threat’ posed by inefficiencies and lack of near real-time capitalization on (fraudulent/malicious)...
View ArticleNewly launched VDS-based cybercrime-friendly hosting provider helps...
Realizing the market segment potential of bulletproof hosting services in a post-Russian Business Network (RBN) world — although it can be easily argued that as long as its operators are at large they...
View ArticleCommercial Windows-based compromised Web shells management application...
For years, whenever I needed a fresh sample of pharmaceutical scams, I always sampled the Web sites of major educational institutions, where a thriving ecosystem relying on compromised Web shells,...
View ArticleCybercrime Trends 2013 – Year in Review
It’s that time of the year! The moment when we reflect back on the cybercrime tactics, techniques and procedures (TTPs) that shaped 2013, in order to constructively speculate on what’s to come for 2014...
View ArticleGoogle’s reCAPTCHA under automatic fire from a newly launched...
It can be easily argued, that CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart), is the modern day’s ‘guardian of the Web’, in the context of preventing the mass,...
View ArticleCommercially available database of 52M+ ccTLD zone transfer domains spotted...
For years, cybercriminals have been building ‘hit lists’of potential targets through automated and efficiency-oriented reconnaissance TTPs (tactics, techniques and procedures). The aim is to...
View ArticleA peek inside a Blackhat SEO/cybercrime-friendly doorways management platform
The perceived decline in the use of blackhat SEO (search engine optimization) tactics for delivering malicious/fraudulent content over the last couple of years, does not necessarily mean that...
View ArticleCommercially available Blackhat SEO enabled multi-third-party product...
Standardization is the cybercrime ecosystem’s efficiency-oriented mentality to the general business ‘threat’ posed by inefficiencies and lack of near real-time capitalization on (fraudulent/malicious)...
View ArticleNewly launched VDS-based cybercrime-friendly hosting provider helps...
Realizing the market segment potential of bulletproof hosting services in a post-Russian Business Network (RBN) world — although it can be easily argued that as long as its operators are at large they...
View Article
More Pages to Explore .....