Is the Angler exploit kit dead?
The Angler exploit kit faded out before, but it soon came back. Are things different this time? Is it gone for good? Continue reading Is the Angler exploit kit dead?
Collaborate Disseminate
The Angler exploit kit faded out before, but it soon came back. Are things different this time? Is it gone for good? Continue reading Is the Angler exploit kit dead?
The malicious hackers developing exploit kits, designed to help online criminals break into computers systems and spread malware, are keener on exploiting Adobe Flash than any other software.
Read more in my article on the HEAT Security blog.
Continue reading Hackers turn their back on exploiting Java, to focus on Flash flaws
Blackhole dominated the worldwide crimeware market throughout 2012 and into early 2013, and huge profits went straight into the pockets of a team of Russian criminals. That’s until they were arrested in October 2013 – and convicted this week. Continue reading Blackhole gang shipping off to Russian penal colony
Exploit kits (EKs) including Magnitude and Nuclear have begun to exploit a type confusion vulnerability in Adobe Flash Player (CVE-2016-1019).Read More Continue reading New Adobe Flash Player exploit used by Magnitude and Nuclear exploit kits
The Latest Intelligence for March 2016 reveals that the average number of mobile malware variants has reached 50 per family.Read More Continue reading Latest Intelligence for March 2016
Hackers are always in search for an elite method to create loopholes in the cyberspace to implement the dark rules in the form of vulnerability exploitation.
Top Trustworthy sites such as The New York Times, BBC, MSN, AOL and many more are on the v… Continue reading Malvertising Campaign Hits Top Websites to Spread Ransomware
Whichever web browser you are using, you should know that using any plugin runs the risk of putting your system – and your data – in increased peril.
Yasin Soliman reports.
Continue reading Plugins – yes, they’re handy but they also increase the surface of attack
An Indian restaurant recommendation site contains injected code which redirects users to the Angler EK, which in turn drops TeslaCrypt (Trojan.Cryptolocker.N) on the computer.Read More Continue reading Burrp compromised to serve Angler EK and deliver TeslaCrypt ransomware
We are excited to announce that we have just integrated Blueliv‘s malicious URL tracker in virustotal, as yet one more URL scanner providing verdicts on URLs submitted by users. In their own words:
Blueliv is a leading provider of cyber threat information and analysis intelligence for large enterprises, service providers, and security vendors. The company’s deep expertise, data sources, and cloud-based platform address a comprehensive range of cyber threats to turn global threat data into real-time actionable intelligence specifically for each client in an easy-to-use dashboard. Blueliv’s clients include leading bank, insurance, telecom, utility, and retail enterprises.
At present, Blueliv’s tracker is highly focused on sites used as C&C infrastructure for trojans, URLs distributing malware and sites with exploit kits, an example of their detections can be found in the following reports:
https://www.virustotal.com/en/url/78b30edc4de035348586cd408626009bbc42be366873e65a8bcc4f35f780f783/analysis/1415884660/
https://www.virustotal.com/en/url/885b6e1dc91e1f01413c0316117f294203d643a1ef3ec79c17556956ff08d086/analysis/1415890213/
Hopefully this integration will lead to increased knowledge about threats and will help protect users world-wide.
Welcome Blueliv! Continue reading virustotal += Blueliv URL scanner
We are excited to announce that we have just integrated Blueliv‘s malicious URL tracker in virustotal, as yet one more URL scanner providing verdicts on URLs submitted by users. In their own words:
Blueliv is a leading provider of cyber threat information and analysis intelligence for large enterprises, service providers, and security vendors. The company’s deep expertise, data sources, and cloud-based platform address a comprehensive range of cyber threats to turn global threat data into real-time actionable intelligence specifically for each client in an easy-to-use dashboard. Blueliv’s clients include leading bank, insurance, telecom, utility, and retail enterprises.
At present, Blueliv’s tracker is highly focused on sites used as C&C infrastructure for trojans, URLs distributing malware and sites with exploit kits, an example of their detections can be found in the following reports:
https://www.virustotal.com/en/url/78b30edc4de035348586cd408626009bbc42be366873e65a8bcc4f35f780f783/analysis/1415884660/
https://www.virustotal.com/en/url/885b6e1dc91e1f01413c0316117f294203d643a1ef3ec79c17556956ff08d086/analysis/1415890213/
Hopefully this integration will lead to increased knowledge about threats and will help protect users world-wide.
Welcome Blueliv! Continue reading virustotal += Blueliv URL scanner