The blurry boundaries between nation-state actors and…

When it comes to attributing malicious cyber activity, there are two buckets by which actors generally fall in: “financially-motivated” or “nation-state.” The former is ultimately interested in money, while the latter is more concerned with obtaining or exploiting sensitive information to gain an advantage over a government or commercial entity. For the past decade, defenders …

The blurry boundaries between nation-state actors and… Read More »

The public sector is a juicy target for cybercriminals

The public sector is an extremely high-value target for cybercrime due to the wealth of valuable information it possesses, such as PII and confidential and sensitive documents. Intel 471 has observed government-run systems being exploited in multiple ways for both financial gain or in politically motivated cyberattacks. By analyzing and distinguishing the common threats and …

The public sector is a juicy target for cybercriminals Read More »

Cybercrime underground flush with shipping companies’…

One of the lingering impacts of the COVID-19 pandemic is the havoc it has wreaked on the global supply chain. There have been extreme fluctuations in the availability of goods, ports around the world are severely backlogged with full containers, and shipping and logistics companies are having trouble finding workers to transport cargo. It is …

Cybercrime underground flush with shipping companies’… Read More »

How cryptomixers allow cybercriminals to clean their…

Cryptocurrency is a cybercriminal’s best friend. Actors all over the world have leveraged this technology’s increased anonymity to buy and sell illegal goods, services, stolen data, underground infrastructure and force victims to pay ransom. While blockchain analysis enables researchers and law enforcement to glean information from illicit transactions, criminals have countered by adopting the use …

How cryptomixers allow cybercriminals to clean their… Read More »

Emotet is back. Here's what we know.

Months after law enforcement agencies took down the notorious Emotet botnet, Intel 471 observed the Trickbot banking trojan downloading and executing possible updated Emotet binaries. This marks the first time we observed Emotet malware activity after the takedown was announced in January. Bots associated with Trickbot, tagged several different gtags (lip125, fat2, top118 and others), …

Emotet is back. Here's what we know. Read More »

A reset on ransomware: Dominant variants differ from…

There’s been a shift in the ransomware-as-a-service ecosystem. Be it due to law enforcement, infighting amongst groups or people abandoning variants altogether, the RaaS groups dominating the ecosystem at this point in time are completely different than just a few months ago. Yet, even with the shift in the variants, ransomware incidents as a whole …

A reset on ransomware: Dominant variants differ from… Read More »

Introducing uCrop, Our Own Image Cropping Library for Android

We develop lots of different Android apps at Yalantis, and our experience shows that almost every application we deal with needs image cropping functionality. Image cropping can be used for various purposes, from ordinary adjustment of user profile images to more complex features that involve aspect ratio cropping and flexible image transformations. Since we want …

Introducing uCrop, Our Own Image Cropping Library for Android Read More »

How We Created uCrop, Our Own Image Cropping Library for Android

Some time ago we created an open-source image cropping library for Android. uCrop is a convenient tool for cropping photos that you can use for your project. Since its creation, the tool has received much attention from the GitHub community and has reached a leading position in the GitHub trending repositories list. As of September 14, 2020, there …

How We Created uCrop, Our Own Image Cropping Library for Android Read More »

Introducing Horizon, Our Open Source Library for Sound Visualization

Yalantis has released several apps with audio recording functionality. Halaa – Instagram for voice and video is the latest example of our work with audio technologies. Every time we want to add some cool visualization for music, however, we have to deal with a lot of issues. First, there are no simple and convenient Android …

Introducing Horizon, Our Open Source Library for Sound Visualization Read More »

Using Machine Learning Algorithm for Predicting House Valuations

Machine learning has been used for years to offer image recognition, spam detection, natural speech comprehension, product recommendations, and medical diagnoses. Today, machine learning algorithms can help us enhance cybersecurity, ensure public safety, and improve medical outcomes. Machine learning systems can also make customer service better and automobiles safer. When I started experimenting with machine …

Using Machine Learning Algorithm for Predicting House Valuations Read More »

What You Can Create with FFmpeg Filters and Frei0r Plugin Effects

FFmpeg is a robust open-source framework designed for command-line-based processing of video and audio files, and widely used for format transcoding, basic editing (trimming and concatenation), video scaling, video post-production effects, and standards compliance. To date, it remains one of the commonly used solutions for processing videos on Ruby on Rails. Frei0r, in turn, is an …

What You Can Create with FFmpeg Filters and Frei0r Plugin Effects Read More »