Quantcast
Channel: Labs Research – OpenDNS Umbrella Blog
Browsing latest articles
Browse All 11 View Live

Image may be NSFW.
Clik here to view.

Detecting the Google Docs Phishing Attack Using Traffic Analysis

The massive phishing attack disguising itself as a Google Docs sharing request is dominating headlines. We’re proud to say that our Sender Rank algorithm detected the attack before the blogs began to...

View Article



Image may be NSFW.
Clik here to view.

The Hours of WannaCry

In the span of just 10 days, two large-scale, wormable attacks grabbed international headlines. First, a phishing campaign posing as a Google Docs sharing request gained access to Google accounts then...

View Article

Image may be NSFW.
Clik here to view.

Protecting ICOs and cryptocurrency users

A whole new world of ICO Bitcoin and cryptocurrencies are disrupting not just the currencies market. A newly observed trend of Internet Coin Offerings (ICOs) is changing the way VCs work with startups....

View Article

Image may be NSFW.
Clik here to view.

Diamonds in the Rough

When threat hunting, it’s important to be thorough and not take things at first glance. With many free automated malware analysis and sandbox environments available, the barrier for threat analysis has...

View Article

Image may be NSFW.
Clik here to view.

The Coin Rush

Malicious cryptocurrency miners have been the latest ‘trend’ with cybercriminals. This is malicious software that gets installed onto a victim’s system that is able to use it’s processing power to mine...

View Article


Image may be NSFW.
Clik here to view.

Now available: Hive-Cortex Analyzer and Maltego Transform for Investigate

Powered by the new Cisco Umbrella Investigate On-Demand Enrichment API We are pleased to announce three updates for Investigate users. For security teams using The Hive-Cortex for threat intelligence,...

View Article

Image may be NSFW.
Clik here to view.

Picture Perfect: How JPG EXIF Data Hides Malware

When we’re not busy threat hunting, we enjoy a good superhero movie. In the same way that the DC franchise is on a movie release spree, malware can follow a similar pattern: either dormant and biding...

View Article

Image may be NSFW.
Clik here to view.

Today’s Catch: Phishing Roundup – Part 1

In this blog post we’re going to cover several aspects of phishing trends that we’ve seen over the past three months. Phishers are always out for your personal information and are using clever ways to...

View Article


Image may be NSFW.
Clik here to view.

Today’s Catch: Phishing Roundup – Part 2

Last week we discussed some trends that we observed in phishing over the past three months. We highlighted a campaign against Canadian banks hosted on compromised WordPress sites and techniques to...

View Article


Image may be NSFW.
Clik here to view.

Obfuscation: The Abracadabra of Malware Authors

When analyzing suspicious domains, Dropbox is one of the brands that is usually under scrutiny. Typically, we are looking at a phishing page that is pretending to be Dropbox in order to steal user...

View Article
Browsing latest articles
Browse All 11 View Live




Latest Images