Blog / Jun 12, 2018
Don’t think your company is immune from nation-state APTs going after your intellectual property. Take these essential steps to protect yourself.
Article / May 9, 2018
Panda malware is back in full force with three currently active campaigns that extend its targets beyond banking to new industries and organizations worldwide.
Blog / Apr 17, 2018
Savvy CISOs don’t go it alone; they rely on in-house collaborators (outside of the security team) to help achieve the organization’s security objectives.
Blog / Feb 8, 2018
Real estate scams are big business for attackers. Be on the lookout for this one, which can leave home buyers destitute if not caught in time.
Blog / Jan 25, 2018 (MODIFIED: Jan 31, 2018)
F5 Labs covered a multitude of threats, vulnerabilities, botnets, attackers, and attacks in 2017. Here are just some of the highlights you might have missed.
Blog / Nov 21, 2017 (MODIFIED: Dec 27, 2017)
Seriously, how many colors are there? And how many of us share the same love of one of those limited choices?
Report / Nov 16, 2017 (MODIFIED: Jan 4, 2018)
Learn about the tricks attackers use to dupe unsuspecting users and how you can help protect them—and your organization.
Blog / Sep 28, 2017 (MODIFIED: Oct 24, 2017)
Stop feeding attackers every piece of the puzzle they need to pull off their scams.
Blog / Sep 7, 2017 (MODIFIED: Dec 29, 2017)
Organizations often overlook the many ways in which their own systems put useful information right into the hands of attackers building cyber scams.
Blog / Aug 22, 2017 (MODIFIED: Sep 28, 2017)
The Internet is full of information about your company that’s easily accessible to anyone and particularly useful to attackers.
Blog / Jul 20, 2017 (MODIFIED: Sep 1, 2017)
The personal and job-related information that employees often innocently post on various websites makes it easy for phishers to pull off their scams.
Blog / Jul 6, 2017 (MODIFIED: Aug 17, 2017)
In this five-part blog series, we look at how cyber scammers vacuum up information across the Internet to build profiles for phishing and other kinds of social engineering attacks.
Blog / Apr 20, 2017 (MODIFIED: Jul 18, 2017)
Your company could lose hundreds of thousands in an impersonation scam, but here are eight things you can do to protect yourself.
Blog / May 26, 2016 (MODIFIED: Jul 6, 2017)
Webinject crafting is a separate profession now. Hackers write webinjects and sell them to fraudsters, who use them to weaponize Trojans.
Article / Feb 25, 2016 (MODIFIED: Jul 6, 2017)
Like many other financial Trojans, the notorious Dridex malware keeps evolving and strengthening its presence.
Report / Dec 14, 2015 (MODIFIED: Jul 6, 2017)
Standard mobile banking trojans post their own fraudulent content over banking applications. Yasuo-Bot goes further.
Blog / Nov 11, 2015 (MODIFIED: Jul 6, 2017)
Dyre malware is a well-known threat that keeps security pros on their toes due in part to the frequent changes the authors incorporate.
Report / Jun 24, 2015 (MODIFIED: Jul 6, 2017)
Slave is financial malware written in Visual Basic. Since 2015 it has evolved from relatively simple IBAN swapping.
Report / Apr 12, 2015 (MODIFIED: Jul 6, 2017)
Dyre is one of the most sophisticated banking malware agents in the wild.
Report / Oct 15, 2014 (MODIFIED: Jul 6, 2017)
Tinba, also known as "Tinybanker", "Zusy" and "HµNT€R$", is a banking Trojan.