Results for "flash exploit"
May 25, 2016 - A well known malvertising gang famous for its use of the fingerprinting technique and other evasion tricks to bypass security checks has been ramping up its activity against many different ad platforms to push malware via top websites. The setup for these malvertising attacks relies on a combination of techniques that start with the fraudulent advertiser choosing a victim, typically a legitimate website in the retail, or legal business.
December 19, 2015 - Recent Flash exploit is used to drop TeslaCrypt via Angler exploit kit.
November 5, 2015 - Trusting Flash-based ads has never been harder when they bundle nasty code.
June 26, 2019 - The GreenFlash exploit kit, which we typically saw targeting South Korean users, reaches globally with a large malvertising campaign via a popular website.
October 30, 2015 - Exploit kits have added the latest Flash Player exploits to their arsenal.
June 28, 2015 - Only a handful of days after it was patched, CVE-2015-3113 is being used in a mainstream exploit kit.
August 25, 2014 - An infected sub-domain hosted on SourceForge is responsible for a drive-by download attack.
December 18, 2019 - In order to maximize infection rate, threat actors are now launching the Spelevo exploit kit with a decoy adult site, social engineering users into downloading a malicious video player.
November 19, 2019 - With even more exploit kits in town, the drive-by download landscape shows continued activity in fall 2019.
September 27, 2019 - A new exploit for iOS enables attackers to gain permanent access to iPhones, iPads, Apple Watches, and more—with zero potential for patching. Learn why this is possibly the biggest security news for iOS since its inception.