Whitepaper: Managing users and authentication with on-premises Active Directory for O365

The move to Office 365 (O365) requires IT departments to make some tough decisions regarding how and where to manage users and authentication. To confuse the picture further, there are many different options an organization can take, from out of the bo… Continue reading Whitepaper: Managing users and authentication with on-premises Active Directory for O365

Six Years and Counting: Inside the Complex Zacinlo Ad Fraud Operation

For more than a decade, adware has helped software creators earn money while bringing free applications to the masses. Headliner games and applications have become widely available to computer and mobile users the world over, with no financial strings … Continue reading Six Years and Counting: Inside the Complex Zacinlo Ad Fraud Operation

RadRAT: An all-in-one toolkit for complex espionage ops

Around February this year, we came across a piece of malware that had previously gone unnoticed. Buried in the malware zoo, the threat seems to have been operational since at least 2015, undocumented by the research community. Our interest was sti… Continue reading RadRAT: An all-in-one toolkit for complex espionage ops

Operation PZChao: a possible return of the Iron Tiger APT

More than 30 years after the end of the Cold War, digital infrastructures worldwide have become strategic national fronts with the same importance as the geographical frontiers of air, land, sea and space. To ensure viability in this fifth domain, cybe… Continue reading Operation PZChao: a possible return of the Iron Tiger APT

Linguistic Analysis Suggests WannaCry Authors Speak Chinese

read more

Continue reading Linguistic Analysis Suggests WannaCry Authors Speak Chinese