All Blogs
Reverse engineering BADBOX 2.0
HUMAN BLOG
Satori Perspectives: BADBOX 2.0 Ups the Sophistication with a New Reverse Engineering Challenge

READ NOW

HUMAN BLOG
BADBOX 2.0: The sequel no one wanted

READ NOW

HUMAN BLOG
Satori Threat Intelligence Disruption: BADBOX 2.0 Targets Consumer Devices with Multiple Fraud Schemes

READ NOW

Super Bowl Fraud: How Attackers Exploit Big Games
HUMAN BLOG
Satori Perspectives: Examining Threat Activity During the Big Game

READ NOW

HUMAN BLOG
Satori Perspectives: Cybercriminals just lost some of  their most popular forums–will it actually slow them down?

READ NOW

How Human security is gaining visibility into Agentic AI behaviour
HUMAN BLOG
Agentic AI: The Future of Automation and Associated Risks

READ NOW

HUMAN BLOG
Trojans All the Way Down: BADBOX and PEACHPIT

READ NOW

HUMAN BLOG
Satori Threat Intelligence Alert: Phish ’n’ Ships Fakes Online Shops to Steal Money and Credit Card Information

READ NOW

HUMAN BLOG
Satori Threat Intelligence Alert: Camu cashes out ads on piracy content

READ NOW

HUMAN BLOG
Satori Threat Intelligence Alert: Konfety Spreads ‘Evil Twin’ Apps for Multiple Fraud Schemes

READ NOW

HUMAN BLOG
The Party’s Over: HUMAN’s Satori Threat Intelligence and Research Team Cleans up “Konfety” Mobile Ad Fraud Campaign

READ NOW

HUMAN BLOG
Satori Threat Intelligence Alert: Merry-Go-Round Conceals Ads from Users and Brands

READ NOW

HUMAN BLOG
Satori Threat Intelligence Alert: PROXYLIB and LumiApps Transform Mobile Devices into Proxy Nodes

READ NOW

HUMAN BLOG
The Impact of Residential Proxy Networks: PROXYLIB

READ NOW

HUMAN BLOG
HUMAN Satori Threat Intelligence Alert: Account Takeover Attacks Use ScrubCrypt to Deploy RedLine Stealer Malware

READ NOW

HUMAN BLOG
BADBOX, PEACHPIT, and the Fraudulent Device in Your Delivery Box

READ NOW

HUMAN BLOG
Trojans All the Way Down: BADBOX and PEACHPIT

READ NOW

HUMAN BLOG
OWNERDOMAIN Adoption Deep-Dive

READ NOW

  • 1