PLUS: Fake ransomware group exposed; EC blesses Google's big Wiz deal; Alleged sewage hacker cuffed; And more Infosec in ...
Eight out of the top ten vulnerabilities exploited by cybercriminals as part of phishing, exploit kits, or RAT attacks during 2018 targeted Microsoft's software products, continuing a trend started in ...
Law enforcement actions and a relative dearth of zero-day bugs appear to have contributed to a sharp decline in exploit kit activity in recent months. It's too soon, however, to say whether the ...
When we talk to people whose computers have been infected, they often ask how it happened. In a growing number of cases, they have been doing nothing more than reading a news website or browsing for ...
The malware landscape is in a constant flux, with new trends and techniques appearing and/or going out of fashion on a monthly basis. Keeping an eye on what's what involves analyzing tens of thousands ...
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Exploit kits comprised of ...
Another major exploit kit (EK) looks like it's heading for the EK graveyard as activity from the RIG EK has fallen to less than 25% of what the exploit kit used to handle three months ago, in March ...