Results for "Flash"

June 26, 2019 - The GreenFlash exploit kit, which we typically saw targeting South Korean users, reaches globally with a large malvertising campaign via a popular website.

CONTINUE READING No Comments

PUP.Optional.FakeFlash

CONTINUE READING No Comments

December 5, 2018 - An APT group is using a new Flash Player zero-day that was used a lure targeting a Russian-based clinic

CONTINUE READING No Comments

June 1, 2018 - If you make use of Flash or Silverlight in your day-to-day activities, you may need to have a word with IT. For everyone else, your Office 365 experience is about to become a lot more secure.

CONTINUE READING No Comments

Trojan.FakeFlash

CONTINUE READING No Comments

March 14, 2018 - An uncommon exploit kit adds a fresh Flash Player exploit to distribute the Hermes ransomware in South Korea.

CONTINUE READING No Comments

February 5, 2018 - Threat actors are targeting South Korea with a Flash Player zero-day in limited attacks, according to Adobe.

CONTINUE READING No Comments

August 12, 2016 - Keeping up with twists and turns on the exploit kit scene, we examine a new redirection mechanism to Neutrino EK which adds fingerprinting way up the infection chain by crafting a special Flash file and uploading it on compromised hosts. This ensures proper filtering of non desirable traffic even before the gate to the exploit kit.

CONTINUE READING No Comments

June 28, 2016 - Since the disappearance of Angler EK, exploit kit activity is at one of its lowest it has been in a long time. The focus is therefore on Neutrino EK, which has somewhat picked up the pieces, although at a much lower rate. In this post we look at a change recently noticed with the Flash exploit Neutrino uses, which now includes fingerprinting of the user's machine.

CONTINUE READING 2 Comments

May 25, 2016 - A well known malvertising gang famous for its use of the fingerprinting technique and other evasion tricks to bypass security checks has been ramping up its activity against many different ad platforms to push malware via top websites. The setup for these malvertising attacks relies on a combination of techniques that start with the fraudulent advertiser choosing a victim, typically a legitimate website in the retail, or legal business.

CONTINUE READING 7 Comments

Select your language