Security Blog

Leave blank for all. Otherwise, the first selected term will be the default instead of "Any".
Waylon Grange's picture
Written by
Waylon Grange

Researchers at Symantec recently posted an article about a botnet called ifwatch, which has infected thousands of IoT devices.  In their article they claim the authors acted as a sort of vigilante, since the botnet patches the vuln

Chris Larsen's picture
Written by
Grettir

[Grettir -- one of our analysts who likes to keep a low profile -- posted this in one of our research group forums last night, and everyone agreed it was one of the most awesome blog posts ever, so here it is. -- C.L.]

 

I'm sure it seemed like a good idea at the time. I can just imagine the conversation…

 

Chris Larsen's picture
Written by
Chris Larsen

We had quite a lot of interest, quite a few questions, and several common misconceptions about our report on Shady TLDs (Top Level Domains) a few weeks ago.

Chris Larsen's picture
Written by
Chris Larsen

As regular readers of our blog know, we've been doing a series of posts on shady TLDs this year. Nine so far, in fact. [See links at the bottom of this post.] Yesterday we released a report summarizing some of this research. It was designed for Mr. or Ms.

Chris Larsen's picture
Written by
Chris Larsen

In the previous post, I mentioned that several Chinese porn networks were using .faith sites, and that one was particularly interesting. This is the follow-up that explains what it's doing.

Anonymous's picture
Written by
Ashwin Vamshi

As a part of the daily work process, I keep an eye on the latest incoming samples to ensure detection in our Malware Appliance. During this process, an interesting decoy caught my attention.