Results for "blackhole"

November 17, 2015 - The year is 2015 and a threat actor is using the defunct Blackhole exploit kit in active drive-by download campaigns via compromised websites.

CONTINUE READING 3 Comments

October 7, 2013 - A few hours ago, a tweet from Maarten Boone, a security researcher at Fox-IT, a Dutch security firm reports that Blackhole exploit kit author Paunch and partners were arrested in Russia.

CONTINUE READING No Comments

July 25, 2018 - We take a fresh look at Trojans: the history of the term, the most popular threats over the years, the different types of Trojans, and their relationship with social engineering.

CONTINUE READING No Comments

June 10, 2016 - In the past week, the Angler EK has almost completely disappeared. Instead, we see Neutrino EK take center stage in various attacks.

CONTINUE READING No Comments

Fiesta

Fiesta is an exploit kit that checks the user’s browser and the versions of the plugins he is using. That is how it determines which exploits can be successfully served. This means that if you happen to come across a Fiesta landing page with multiple vulnerable products, this will lead to receiving exploits for all of them.

CONTINUE READING No Comments

Exploit kits

An exploit kit is a toolkit designed to facilitate the exploitation of client-side vulnerabilities most commonly found in browsers and their plugins in order to deliver malware on end users’ machines.

CONTINUE READING No Comments

Angler

Angler was one of the leading exploit kits used by cybercriminals to distribute malware ranging from ransomware and banking Trojans to ad fraud. Like most other exploit kits, it focused on web-based vulnerabilities in the browsers and their plugins. Angler was one of the few exploit kits during its time that offered fileless infections, where malware never touches the disk and only resides in memory to avoid detection.  Angler has been inactive since June 2016.

CONTINUE READING No Comments

December 2, 2015 - Two suspects were arrested for selling Cryptex Reborn and other FUD tools recently. Today, we will study some examples of these type of tools and what makes them dangerous.

CONTINUE READING 1 Comment

November 23, 2015 - A compilation of notable security news and blog posts from November 15 to 21.

CONTINUE READING No Comments

November 18, 2015 - Cyber security, malvertising and exploit are a hot topic, even across the Pond. If there's one place where the impact of cybercrime is being felt recently, it's in the UK.

CONTINUE READING No Comments

Select your language