Exploit kits have been around since 2006, and have been continuously evolving to take advantage of vulnerabilities found on popular software. This research paper discusses what exploit kits are, how they work, and how they evolved over time.
live casino online researchers found that the recently discovered Adobe Flash player zero-day vulnerability is being abused by malware advertisements used by a top video-sharing site, among other sites. Update: Adobe has released an update that addresses this vulnera
A look into the threat landscape during the third quarter of 2014 reveals the loopholes and vulnerabilities in often overlooked targets such as routers and PoS systems that were used as attack vectors.
A new Shellshock attack targeting SMTP servers has been discovered. Attackers used email to deliver the exploit, which downloads and executes an IRC Bot.
A recent investigation revealed that the Sandworm zero day exploit could likely be used to target GE Intelligent Platform CIMPLICITY users. Find out what it does and how you can safeguard your systems against this emerging attack.
The term ¡°secure¡± can only mean so much, especially in the case of the widely-used Secure Sockets Layer (SSL) protocol version 3.0, a 15-year old design Google found to have a major flaw that possibly affects millions of Internet users.
A new zero-day exploit that reportedly targets a military organization welcomes Patch Tuesday announcements as Microsoft announces a previously unknown vulnerability on Windows systems. (Update: Patch for "Sandworm" vulnerability has been released.)