- Security
- By Catalin Cimpanu
- October 2nd, 2016
Neutrino Exploit Kit Activity Slows Down to a Trickle
Is Neutrino shutting down or going private?
- Security
- By Catalin Cimpanu
- September 28th, 2016
RIG Surpasses Neutrino to Become Today's Most Active Exploit Kit
There's a new sheriff in town and his name is RIG
- Security Blog
- By Catalin Cimpanu
- September 20th, 2016
Malvertising Campaign Using RIG EK Detected Pushing CrypMIC Ransomware
Users should install an ad blocker just to be safe
- Security
- By Ionut Ilascu
- December 11th, 2014
OphionLocker, the New Ransomware on the Block
Public-key cryptography used for data encryption
- Incidents
- By Ionut Ilascu
- September 24th, 2014
Credential Stealing Attack Carried Out Through jQuery.com
jQuery team’s investigation found no trace of compromise
- Security
- By Ionut Ilascu
- June 27th, 2014
Rogue Ad Network Uses Flash and Silverlight Exploits
Security researchers find ads that lead to RIG exploit kit delivery page