Zero-day vulnerabilities—and their potential, related attacks—can drive any security team mad. Here’s how you can bulk up your defenses.
This custom made drive-by download attack targets some Chinese websites and their visitors while experimenting with exploits.
In this post we take a quick glance at some changes made to the Sundown exploit kit. The landing page has been tweaked and uses various obfuscation techniques. Sundown is used in some smaller campaigns and in this particular case dropped a downloader followed by a banking Trojan.
Video Saver PUP puts restrictions in place to block changing search provider settings in Internet Explorer.
Angler EK exploits new Internet Explorer vulnerability.
Patch Tuesday brings a slew of updates for your version of Windows, however one vulnerability in particular has been on the minds of users, maintainer and protectors for days. What is this vulnerability, how can it be used against you and what do you need to do to make sure it isn’t a problem in the future?