This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Exploit kits comprised of ...
The developers of the Neutrino exploit kit have added a new feature intended to thwart security researchers from studying their attacks. The feature was discovered after Trustwave’s SpiderLabs ...
The RIG exploit kit is now infecting victim's computers with a new ransomware variant called Buran. This ransomware is a variant of the Vega ransomware that was previously being distributed through ...
The Spelevo exploit kit has been spotted by security researchers while infecting victims with Maze Ransomware payloads via a new malicious campaign that exploits a Flash Player use after free ...
The malware landscape is in a constant flux, with new trends and techniques appearing and/or going out of fashion on a monthly basis. Keeping an eye on what's what involves analyzing tens of thousands ...
A shadowy hacking tool shows why skipping iPhone updates can be a dangerous gamble. On Tuesday, security researchers disclosed “Coruna,” a software kit that leverages nearly two dozen iOS exploits to ...
Researchers from FireEye have found the first use in the wild of a new kind of injection technique that was first described in October. The technique is used by the RIG exploit kit to inject code that ...
TA446 used leaked DarkSword on March 26 to target iOS devices, prompting Apple alerts and widening mobile espionage risks.