MENUMenuIcon OUR STORY

SLASHNEXT LABS

THE KNOWLEDGE CENTER

Breaches

VIEW CATEGORIESHIDE CATEGORIES

Category » Breaches

Inside a Phishing Network

Credential Phishing is an effective way to snatch someone’s confidential information.  Hacker’s create a look-a-like login page matching a global brand’s login (Google, Yahoo, Microsoft) and send a phishing email containing a link to the fake page. When a victim clicks on the phishing link, the fake page (which exactly resembles the brand’s login page) is …

Deep Panda: Polymorphism at its best

In our previous blog we talked about a chinese threat actor named Deep Panda who used a well known malware family Sakula to infiltrate Anthem’s network. We at SlashNext Labs, track these type of threat actors and tools they use as part of daily routine. We have a comprehensive association database namedxIntel, using which we …

Anthem Breach

The Anthem breach  was one of 2014’s most significant data breaches.  Attackers are believed to have ex filtrated the records of millions of Anthem customers. It is widely believed that the attackers started penetrating the Anthem network around Jan 2015, but our research indicates otherwise. We believe that the attack on Anthem’s network began around April …