Author Archives: Or Katz
The Crypto Revolution Reaches Fever Pitch for Today?s Phishing Scammers
Akamai threat researchers tracked continuous cyberattack and crypto-phishing campaigns that took advantage of cryptocurrency-based scams. Continue reading The Crypto Revolution Reaches Fever Pitch for Today?s Phishing Scammers
Digging Deeper ? An In-Depth Analysis of a Fast Flux Network
Fast Flux is a DNS technique used by botnets to hide various types of malicious activities, such as phishing, web proxying, malware delivery, and malware communication, behind an ever-changing network of compromised hosts acting as proxies. The Fast Fl… Continue reading Digging Deeper ? An In-Depth Analysis of a Fast Flux Network
Over 25% of Malicious JavaScript Is Being Obfuscated
Last year, Akamai released research on obfuscation techniques being used by cybercriminals to create malicious JavaScript. The code is unreadable, un-debuggable, and as a result, much more challenging to analyze and detect. Continue reading Over 25% of Malicious JavaScript Is Being Obfuscated
Crypto Threats Surge by 500%, and It’s All About the Money
Previously reserved for early adopters and tech-savvy consumers, cryptocurrencies have gone mainstream — with tech entrepreneurs and prominent financial institutions leading the charge. Continue reading Crypto Threats Surge by 500%, and It’s All About the Money
Crypto Threats Surge by 500%, and It’s All About the Money
Previously reserved for early adopters and tech-savvy consumers, cryptocurrencies have gone mainstream — with tech entrepreneurs and prominent financial institutions leading the charge. Continue reading Crypto Threats Surge by 500%, and It’s All About the Money
Two Years of Tax Phishing – The Oldest Scam in the Book
Tax scams are some of the oldest scams in a criminal’s book, and they’re highly attractive to criminals for many reasons. Continue reading Two Years of Tax Phishing – The Oldest Scam in the Book
Finding the Cracks in the Wall – The Hazard of Single Authentication Factor
The use of authentication factors, one of the most fundamental and well understood concepts in information security, enables secure access to applications, services, and networks. It can affect an enterprise’s security posture, however, as the drastic … Continue reading Finding the Cracks in the Wall – The Hazard of Single Authentication Factor
Finding the Cracks in the Wall – The Hazard of Single Authentication Factor
The use of authentication factors, one of the most fundamental and well understood concepts in information security, enables secure access to applications, services, and networks. It can affect an enterprise’s security posture, however, as the drastic increase in data breaches and system attacks are largely based on compromised authentication. Continue reading Finding the Cracks in the Wall – The Hazard of Single Authentication Factor
Finding the Cracks in the Wall – How Modern Scams Bypass MFA
In my previous blog, I discussed the important role multi-factor authentication (MFA) plays in further securing access to enterprise and consumer services. We also established the fact that although MFA increases authentication security and decreases t… Continue reading Finding the Cracks in the Wall – How Modern Scams Bypass MFA