This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Exploit kits comprised of ...
Threat analysts have uncovered yet a new campaign that uses the RIG Exploit Kit to deliver the RedLine stealer malware. Exploit kits (EKs) have dropped drastically in popularity as they targeted ...
The RIG exploit kit is now infecting victim's computers with a new ransomware variant called Buran. This ransomware is a variant of the Vega ransomware that was previously being distributed through ...
A shadowy hacking tool shows why skipping iPhone updates can be a dangerous gamble. On Tuesday, security researchers disclosed “Coruna,” a software kit that leverages nearly two dozen iOS exploits to ...
The malware landscape is in a constant flux, with new trends and techniques appearing and/or going out of fashion on a monthly basis. Keeping an eye on what's what involves analyzing tens of thousands ...
The RIG exploit kit has recently shown new life through the use of a zero-day exploit, which researchers believe was first used by attackers associated with the North Korean government. The exploit ...
Researchers from FireEye have found the first use in the wild of a new kind of injection technique that was first described in October. The technique is used by the RIG exploit kit to inject code that ...
Some websites running the e-commerce platform Magento appear to have been infected with code that directs victims to the Neutrino exploit kit. It’s not exactly clear how the Magento sites were ...