Infodemic is happening now to our world. The leverage of the current physical threat, the CoronaVirus, is being used as a social engineering trick to infect the cyber world. Be informed and read on these interesting and useful articles we have gathered.

For more articles, check out our #onpatrol4malware blog.


NEW STUDY: Which Domains Get Kept and Which Get Dropped? [Data on .COM vs Everything Else]

Source: Who Is Hosting This

We set out to find how often people let domains lapse each year (churn rate) and which of the most popular TLDs suffer the most from this. Read more.


M-Trends 2020 FireEye Mandiant Services Special Report

Source: FireEye

The release of M-Trends 2020 marks 11 years of providing the cyber security community with insights gained from the frontlines of those attacks. Read more.


New ‘Haken’ Malware Found On Eight Apps In Google Play Store

Source: Threat Post

Eight apps – mostly camera utilities and children’s games – were discovered spreading a new malware strain that steals data and signs victims up for expensive premium services. Read more.

malicious Microsoft Office documents

Raccoon: The Story of a Typical Infostealer

Source: Cyber Ark

An infostealer is a type of malware that is focused on gathering sensitive and conditional information (such as user’s credentials, financial and personal information) from the compromised system. Read more.


New Cyber Attack Campaign Leverages the COVID-19 Infodemic

Source: Yoroi

It is common to say that the physical world and the cyber world are strictly connected. The proof is the leverage of the current physical threat, the CoronaVirus, as a social engineering trick to spread infodemic. Read more.


Chrome 80 update cripples top cybercrime marketplace

Source: ZDNet

A small change in the Google Chrome 80 browser has had a devastating effect on one of today’s top cybercrime marketplaces. Read more.



Source: Team Cymru

Community research into the Gamaredon Group reveals a series of sophisticated attacks targeted predominantly against Ukrainian military interests, dating back to at least 2013. Read more.


Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit Sources

Source: Departmet of Justice

The Cybersecurity Unit (CsU) prepared this document in response to questions posed by private organizations about the legality of specific cybersecurity measures. Read more.