Threat Reports
- A look into the threat landscape during the third quarter of 2014 reveals the loopholes and vulnerabilities in often overlooked targets such as routers and PoS systems that were used as attack vectors.During the first half of 2014, attacks against Asia-Pacific countries showed some notable techniques used by attackers to evade detection and steal data. This report details the targeted attack campaigns and trends over that period.Learn about the biggest mobile threats and more from the first half of 2014.A closer look at the security landscape during 2Q 2014, as various industry players turned the tables on cyber attacks such as Heartbleed and DDoS.The latter half of 2013 lay witness to two new targeted attack campaigns: BLYPT, which hosts its servers in Romania and Turkey, and Esile, which targets government agencies in APAC to execute remote commands.2013 showed that the mobile threat landscape is slowly moving beyond apps. We saw infection and attack chains that didn’t solely rely on malicious app installation, including ads, PC malware, and spear-phishing emails. 2013 proved just how many tools cybercrim