Another major exploit kit (EK) looks like it's heading for the EK graveyard as activity from the RIG EK has fallen to less than 25% of what the exploit kit used to handle three months ago, in March ...
Cisco released its 2017 Midyear Cybersecurity Report on July 20, revealing trends old and new about the state of threats impacting organizations around the world. A number of those trends are positive ...
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Exploit kits comprised of ...
Law enforcement actions and a relative dearth of zero-day bugs appear to have contributed to a sharp decline in exploit kit activity in recent months. It's too soon, however, to say whether the ...
When we talk to people whose computers have been infected, they often ask how it happened. In a growing number of cases, they have been doing nothing more than reading a news website or browsing for ...
For a long time, exploit kits were the most prolific malware distribution vehicle available to attackers. Where did they go and what’s replaced them? The bloom is off exploit kits. Once a mainstay for ...
Here are the exploit kits to watch for over the next three to six months. Over the past six months, the roar of exploit kits has quieted to a whimper. But that doesn’t mean exploit kit threats are ...
Security company Proofpoint has identified two new exploits coded into Purple Fox, an exploit kit that has evolved dramatically in the last year. The updates show that cyber-criminals are continuing ...
Of the top 10 vulnerabilities incorporated by exploit kits in 2016, six of them (rather unsurprisingly) affected Adobe Flash Player. Real-time threat intelligence provider Recorded Future arrived at ...
Six of the top 10 vulnerabilities found in cyberattack exploit kits in 2016 were bugs in Adobe Flash Player – including one Flash flaw that was packaged with a whopping seven different exploit kits, ...
A well known vulnerability exploit that can be used to compromise Internet Explorer versions 6, 7 and 8 has been added to the Eleonore attack kit, heightening the chances that more exploits will occur ...
A threat actor that has infected more than 20,000 WordPress sites by running the same trick for at least three years: distributing trojanized versions of premium WordPress themes and plugins. Identity ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results