New explanation for Antarctic mystery doesn’t need “parallel universe”

Headlines all over the internet lately have been screaming about how scientists in Antarctica have discovered evidence of a parallel universe where time runs backwards. While we seriously wish that was true, a new study has put forward a more realistic… Continue reading New explanation for Antarctic mystery doesn’t need “parallel universe”

High-energy cosmic neutrinos traced back to their home quasars

There are billions of tiny particles called neutrinos streaming through your body right now. But where did they come from? Russian researchers have now traced back some ultra-high energy neutrinos to their points of origin – radio flares from raging qu… Continue reading High-energy cosmic neutrinos traced back to their home quasars

Mapping Out a Malware Distribution Network

More than a dozen US-based web servers were used to host 10 malware families, distributed through mass phishing campaigns. Malware families include Dridex, GandCrab, Neutrino, IcedID and others. Evidence suggests the existence of distinct threat actors… Continue reading Mapping Out a Malware Distribution Network

Former Hacking Team Members Are Now Spying on the Blockchain for Coinbase

Coinbase said it’s aware of the Neutrino founders’ controversial past, but their technology is the best the major exchange has encountered. Continue reading Former Hacking Team Members Are Now Spying on the Blockchain for Coinbase

Disdain exploit kit served with a side of social engineering

Exploits may not be enough as threat actors combine them with social engineering in a new Disdain exploit kit attack method.
Categories:

Exploits
Threat analysis

Tags: DisdainEKexploit kitneutrino

(Read more…)

The post Disdain exploi… Continue reading Disdain exploit kit served with a side of social engineering

Terror Exploit Kit Evolves Into Larger Threat

The Terror exploit kit has matured into a greater threat and carefully crafts attacks based on a user’s browser environment. Continue reading Terror Exploit Kit Evolves Into Larger Threat

Where Have All The Exploit Kits Gone?

For a long time, exploit kits were the most prolific malware distribution vehicle available to attackers. Where did they go and what’s replaced them? Continue reading Where Have All The Exploit Kits Gone?

Exploit kits: Winter 2017 review

We take a look at the current exploit kit scene (Winter 2017) according to our telemetry and honeypots.
Categories:
Exploits
Threat analysis
Tags: EKexploit kitsMagnitudemalvertisingmalvertsmalwareneutrinoransomwareRIGsundown

(Read more…)

The po… Continue reading Exploit kits: Winter 2017 review