The developers of the Neutrino exploit kit have added a new feature intended to thwart security researchers from studying their attacks. The feature was discovered after Trustwave’s SpiderLabs ...
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Exploit kits comprised of ...
A new exploit kit that researchers named Spelevo has emerged recently targeting a certain category of victims and infect their computer systems with two banking trojans. To achieve their goal, exploit ...
Exploit kit activity has been on the decline since the latter half of 2016. However, we do still periodically observe significant developments in this space, and we have been observing interesting ...
Threat analysts have uncovered yet a new campaign that uses the RIG Exploit Kit to deliver the RedLine stealer malware. Exploit kits (EKs) have dropped drastically in popularity as they targeted ...
The cybercriminals behind the RIG Exploit Kit earlier this year traded out the credential-stealer Trojan Raccoon Stealer after its lead developer was killed in the Russian invasion of Ukraine.
When we talk to people whose computers have been infected, they often ask how it happened. In a growing number of cases, they have been doing nothing more than reading a news website or browsing for ...
A new report out by Sophos shows that in a post-Blackhole exploit kit world, Angler is gaining ground as a favorite attack tool among cybercriminals. "Since the demise of the Blackhole exploit kit in ...
Hackers backed by North Korea’s government exploited a critical Chrome zero-day in an attempt to infect the computers of hundreds of people working in a wide range of industries, including the news ...
The State Department has placed a bounty of up to $2.5 million on information leading to Volodymyr Kedariya’s arrest. The US Department of State is offering a reward of $2.5 million for information ...