Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Phishing/malware

Latest blogs

Topic : Phishing/malware
  • --Any--
  • Anonymous research
  • Compliance
  • Cryptocurrency
  • Cybersecurity
  • Dark web basics
  • Dark web research
  • Digital fingerprint
  • Financial crime
  • Fraud and brand misuse
  • Law enforcement
  • OSINT news
  • OSINT research
  • Phishing/malware
  • Product info
  • Secure web access
  • SOC
  • Social media
  • Threat intelligence
  • Trust and safety
  • VPN
  • Zero-trust app access

Cybersecurity news roundup: ZeroFont, chatbot malvertising and a WebP zero-day

We’ve gathered the latest news on threats, malicious technology and cybersecurity advancements you need to know.

Exploring the surface, deep and dark web: unveiling hidden insights

Most people think that internet content comprises the websites they find via search engines, but so much of the internet is hidden from…

Foolproof security of user web activity

Even the most security-aware users make mistakes and can accidentally expose their organizations’ networks to malware and other…

A recent Google malvertising scheme highlights the need for secure research environment

Investigating a malvertising scheme that tricked one of the world’s largest search engines is a dangerous game. Here’s how to do so safely:

Why conducting sensitive online research from Starbucks is a bad idea

Free Wi-Fi may seem like a convenient way to alter your digital fingerprint and avoid tipping off investigative targets, but the risks…

Safely investigate phishing sites without getting hooked

Phishing sites commonly contain malicious content that can put SOCs and their organizations at risk as they conduct investigations. But…

5 Steps for secure malware analysis

Malware analysis is a tricky process. Incorrect handling leads to accidental self-exposure, which can be devastating depending on where the…

generia blog

Combating malware in 2020: process, trends and tools

Adversaries are continuously honing their skills, planning for their next attack. How to stay one step ahead? The right framework prepares…

generia blog

Research: More worries with Wasm

In many web browsers, the WebAssembly programming language is taking over execution tasks that were once exclusively the domain of…

Blog updates

Stay updated with the latest posts from the blog
Close
Close