During the course of our work at Confiant, we see malicious activity on a daily basis. What matters the most for us is the ability to: | Continue reading
Article URL: https://blog.confiant.com/how-one-crypto-drainer-template-facilitates-tens-of-millions-of-dollars-in-theft-66f3794aea4b?gi=b10068d5caa8 Comments URL: https://news.ycombinator.com/item?id=31758594 Points: 177 # Comments: 190 | Continue reading
A year ago, we published a comprehensive disclosure that introduced Tag Barnakle, a threat actor whose specialty is the mass compromise of… | Continue reading
Two cybercrime groups from China are so deeply embedded in adtech that they can launch attacks that surpass the scale of largest advertisers | Continue reading
This blog post will dissect a tech support scam that we caught on a major publisher running via native-style tile ads, which contrary to… | Continue reading
FizzCore — The Engine of Deception | Continue reading
This blog post will cover two techniques that persistent, high volume malvertisers have been leveraging in recent months to maximize the… | Continue reading
Looking at a recent Malvertising campaigns detected by Confiant realtime Malvertising detection engine, we stumbled upon a slightly… | Continue reading
We have written about the threat actor eGobbler extensively on our blog over the last year as they’ve continued to emerge as a prolific… | Continue reading
We have written about the threat actor eGobbler extensively on our blog over the last year as they’ve continued to emerge as a prolific… | Continue reading
Mac Spyware Shlayer is now dropping an entirely new malware we called OSX/Tarmac. | Continue reading
This blog post explores the techniques and tactics of a persistent malvertiser that operates under a company called “fiber-ads”. We… | Continue reading
As publishers have become increasingly aware over the last week, there’s a series of rampant malvertising campaigns on the loose… | Continue reading
On January 23rd, we published a detailed report in collaboration with Malwarebytes concerning a prolific and persistent malvertiser that… | Continue reading
Recent months have seen an uptick in reports of JavaScript malware that hides in image files. This is often referred to as “image based… | Continue reading