Novidade Exploit Kit Actively Targeting SOHO and Home Routers

Novidade Exploit Kit Actively Targeting SOHO and Home Routers

Malware campaign uses CSRF to change routers' DNS settings

ShadowBrokers Now Selling Windows Exploits (Including a 0-day) for 750 Bitcoin

ShadowBrokers Now Selling Windows Exploits (Including a 0-day) for 750 Bitcoin

Pack of tools exposing Windows users now sold online

Flash Player Security Flaws Used in Most Exploit Kits, Security Research Shows

Flash Player Security Flaws Used in Most Exploit Kits, Security Research Shows

Exploit kits attempt to take advantage of Flash Player vulnerabilities, not only in Windows, but also in Linux and Mac

Neutrino Exploit Kit Activity Slows Down to a Trickle

Neutrino Exploit Kit Activity Slows Down to a Trickle

Is Neutrino shutting down or going private?

  • Security
  • By Catalin Cimpanu
  • September 30th, 2016
Sneaky JavaScript Waits for User Interaction Before Infecting Them with Malware

Sneaky JavaScript Waits for User Interaction Before Infecting Them with Malware

Malicious code disguised as jQuery plugin

  • Security
  • By Catalin Cimpanu
  • September 28th, 2016
RIG Surpasses Neutrino to Become Today's Most Active Exploit Kit

RIG Surpasses Neutrino to Become Today's Most Active Exploit Kit

There's a new sheriff in town and his name is RIG

  • Security
  • By Catalin Cimpanu
  • September 18th, 2016
Exploit Kits Feed Off Flash Bugs, but One IE Vulnerability Is Their Favorite

Exploit Kits Feed Off Flash Bugs, but One IE Vulnerability Is Their Favorite

CVE-2013-2551 is the most popular vulnerability with EKs

  • Security
  • By Catalin Cimpanu
  • September 4th, 2016
Sundown Is Just a Bunch of Exploits Stolen from Other Exploit Kits

Sundown Is Just a Bunch of Exploits Stolen from Other Exploit Kits

Sundown EK fails to improve market share among fellow EKs

  • Security
  • By Catalin Cimpanu
  • September 1st, 2016
Massive Malvertising Campaign Shut Down by Cisco and GoDaddy

Massive Malvertising Campaign Shut Down by Cisco and GoDaddy

Crooks were installing CrypMIC ransomware via Neutrino EK

Mystery Solved: Angler Exploit Kit Was Developed by Now-Arrested Lurk Gang

Mystery Solved: Angler Exploit Kit Was Developed by Now-Arrested Lurk Gang

Angler EK was a small part of the huge Lurk infrastructure

HOMEKit Office Exploit Generator Links Five Cyber-Espionage Campaigns

HOMEKit Office Exploit Generator Links Five Cyber-Espionage Campaigns

Eventually all loose ends are tied up and crooks caught

There Is a Connection Between the Lurk Arrests, Angler, and the Necurs Botnet

There Is a Connection Between the Lurk Arrests, Angler, and the Necurs Botnet

Email address found used for registering C&C domain names for Lurk, Angler, and Necurs infrastructure

Sundown Exploit Kit Rises After Death of Angler and Nuclear

Sundown Exploit Kit Rises After Death of Angler and Nuclear

Exploit kit market hasn't died with Angler, nor Nuclear

Nuclear Exploit Kit Shuts Down As Researchers Probe Its Infrastructure

Nuclear Exploit Kit Shuts Down As Researchers Probe Its Infrastructure

Nuclear EK shut down a month before the Angler EK

Zerorose Project Shows You What Exploit Kits See

Zerorose Project Shows You What Exploit Kits See

Project helps users update vulnerable software

All Clues Point to the Death of the Angler Exploit Kit

All Clues Point to the Death of the Angler Exploit Kit

Angler EK spotted online for the last time on June 7

Microsoft: Flash Content Found on 90 Percent of All Malicious Web Pages

Microsoft: Flash Content Found on 90 Percent of All Malicious Web Pages

Microsoft issues a list of ten cyber-security trends

 
Want more? Browse: