Results for "Nuclear"
Exploit kits are efficient and effective tools for cybercriminals to distribute malware. Exploit kits include exploits for multiple vulnerabilities within a single malicious webpage. Cybercriminals are able to check for vulnerabilities in operating systems, web browsers, and browser plugins so as to launch an exploit specific to the identified vulnerability. And this is how Nuclear operates.
February 17, 2016 - An update to the recent WP compromise campaign.
February 8, 2016 - This rogue CloudFlare page hides a malicious payload.
February 3, 2016 - A new wave of compromised sites pushes Nuclear exploit kit.
December 11, 2015 - Ransomware is being dropped in a large ongoing malvertising attack via Nuclear EK.
April 10, 2015 - During our malware investigations, we are often learning about new techniques or ways the bad guys try to bypass us. But sometimes, we also experience cultural differences or discover some new things about people or countries. Today is such as case, with a bit of a geography lesson brought to us by the RIG exploit kit which takes us to Croatia.
March 19, 2015 - A recently patched vulnerability (CVE-2015-0336) for the Flash Player is being exploited in the wild to distribute malware.
September 18, 2014 - Our honeypots just caught malicious activity coming out of The Times of Israel and The Jerusalem Post, popular online newspapers, which turned out to be an interesting case of malvertising.
July 29, 2014 - YouTube stats tracker SocialBlade.com connected with malicious redirections that leads to Nuclear Pack exploit kit.
December 19, 2019 - As the 2010s come to a close, we take a snarky walk down memory lane, listing the craziest, most impactful, or simply just awful cybersecurity fails of the decade.