Topics
Trojan Extension Malware: 3-Year Campaign, 300k Infections
A multi-year campaign of malware extensions first infect browsers through malvertising and ultimately lead to data loss and arbitrary code execution.
Protecting Against the ‘0.0.0.0 Day’ Vulnerability
New browser-related threats targeting employees emerge almost daily. Recently, threat researchers uncovered a critical vulnerability known as ‘0.0.0.0 Day’, which reveals a significant gap in
A Link, Click, and a Phish Away! Using Legitimate Domains for a Multi-Step Phishing Attack
Key points: Overview Keep Aware has observed phishing attacks that use legitimate domains to host links that eventually lead to a credential stealing web page.
“Looking” for Documents? .. “Look” No Further: A New Trend in Abusing Google Looker Studio for Phishing
Keep Aware has uncovered evidence that Google Looker Studio is being abused by bad actors to host intermediate phishing pages.
Cloudflare R2, Public Buckets and a Phishing Binge: An Analysis of Today’s Threat Landscape
Cloudflare public R2 buckets are being abused to host phishing pages.
Clicking Links, From Canva Design to Phishing Site: An Analysis of Today’s Threat Landscape
Keep Aware’s Threat Research function shares recent analysis of Canva’s platform abuse for phishing purposes.
The Abuse of Microsoft Dynamics 365 Standalone Forms: An Analysis of Today’s Threat Landscape
An analysis of Microsoft Dynamics 365 standalone forms reveals that, in today’s browsing threat landscape, 1 in 5 forms are threats.
AI and Zero-Day Phishing: Combating The Evolving Browser-Based Security Challenges
With the rise of generative AI usage across industries, no one should be surprised this trend also applies to the cybercriminal industry. They, too, are
Understanding Security Support Scams: A Comprehensive Analysis
Key Topics and Findings: Overview In today’s interconnected world where practically all employees use the internet, the prevalence of security support scams and other social
From Google Search to Microsoft Security Scam
Key Findings: Overview Keep Aware’s Threat Research division identified a recent batch of fraudulent Microsoft support sites. While these scam campaigns are not novel, they
Enhancing your Cybersecurity Posture with the Power of Pause
Taking a moment or pausing before taking action is not a new concept; it is ingrained in all of our technology. It is an essential