All Blogs

HUMAN BLOG
Satori Perspectives: BADBOX 2.0 Ups the Sophistication with a New Reverse Engineering Challenge
READ NOW

HUMAN BLOG
BADBOX 2.0: The sequel no one wanted
READ NOW

HUMAN BLOG
Satori Threat Intelligence Disruption: BADBOX 2.0 Targets Consumer Devices with Multiple Fraud Schemes
READ NOW

HUMAN BLOG
Satori Perspectives: Examining Threat Activity During the Big Game
READ NOW

HUMAN BLOG
Satori Perspectives: Cybercriminals just lost some of their most popular forums–will it actually slow them down?
READ NOW

HUMAN BLOG
Agentic AI: The Future of Automation and Associated Risks
READ NOW

HUMAN BLOG
Trojans All the Way Down: BADBOX and PEACHPIT
READ NOW

HUMAN BLOG
Satori Threat Intelligence Alert: Phish ’n’ Ships Fakes Online Shops to Steal Money and Credit Card Information
READ NOW

HUMAN BLOG
Satori Threat Intelligence Alert: Camu cashes out ads on piracy content
READ NOW

HUMAN BLOG
Satori Threat Intelligence Alert: Konfety Spreads ‘Evil Twin’ Apps for Multiple Fraud Schemes
READ NOW

HUMAN BLOG
The Party’s Over: HUMAN’s Satori Threat Intelligence and Research Team Cleans up “Konfety” Mobile Ad Fraud Campaign
READ NOW

HUMAN BLOG
Satori Threat Intelligence Alert: Merry-Go-Round Conceals Ads from Users and Brands
READ NOW

HUMAN BLOG
Satori Threat Intelligence Alert: PROXYLIB and LumiApps Transform Mobile Devices into Proxy Nodes
READ NOW

HUMAN BLOG
The Impact of Residential Proxy Networks: PROXYLIB
READ NOW

HUMAN BLOG
HUMAN Satori Threat Intelligence Alert: Account Takeover Attacks Use ScrubCrypt to Deploy RedLine Stealer Malware
READ NOW

HUMAN BLOG
BADBOX, PEACHPIT, and the Fraudulent Device in Your Delivery Box
READ NOW

HUMAN BLOG
Trojans All the Way Down: BADBOX and PEACHPIT
READ NOW

HUMAN BLOG
OWNERDOMAIN Adoption Deep-Dive
READ NOW
- 1