29 Posts

Etay Maor

Senior Fraud Prevention Strategist, IBM Security

Etay is a senior fraud prevention strategist at Trusteer, an IBM company, where he leads fraud fighting and threat awareness projects. A security evangelist, Etay regularly presents at industry events and academic master classes as well as volunteer for educational security awareness programs.

Written By Etay Maor

Diagnosing the Details of a Malware Infection

As threat detection techniques evolve, so does the malware infection process, which typically includes advanced verions of downloaders, droppers and more.

Building a Cyberattack: Social Engineering, Zero-Day Vulnerabilities and More

Many cybercriminals today use social engineering as a means of carrying out attacks. In fact, this method is among the most popular attack types.

Cybercrime Ecosystem: Everything Is for Sale

The current cybercrime ecosystem puts resources at the fingertips of criminals, making it easier to carry out more extensive or sophisticated attacks.

Taking Evasive Actions Against Cyberfraud

Cybercriminals are investing time and effort to improve their cyberfraud techniques in order to evade detection by security researchers and solutions.

The Darknet Isn’t Just for Dark Deals

When discussing the darknet, the focus has shifted from its use as infrastructure for malware communication to the hidden services it offers.

Fraud Risk Engines: The Statistics Are Not in Your Favor

The following is a look into how authentication risk engines are designed and the root cause for their failure in detecting today's cybercriminals.

How to Bypass Two-Factor Authentication (2FA) and What the Future Holds

Even as authentication techniques become more advanced, there are different ways cybercriminals can bypass two-factor authentication (2FA).

New Variant of Bugat Malware Borrows Lucrative Gameover Zeus Techniques

A new Bugat malware variant is using techniques similar to the Gameover Zeus HTML injections to target banking applications and steal user credentials.

Citadel’s New Trick: Persistent Device Remote Control

Citadel, a type of malware, can now persistently have remote control of devices, which is an advanced threat that can affect many victims.

The Father of Zeus: Kronos Malware Discovered

Researchers at Trusteer, an IBM company, recently discovered the Kronos malware, which offers compatibility with Zeus, in a Russian cyber crime forum.