Please turn on your JavaScript for this page to function normally.
Exploit tool hitting Joomla and WordPress sites

Joomla and WordPress sites’ administrators should consider updating to the latest version of their respective content management system as soon as possible since, …

Six threats to watch out for in 2013

FortiGuard Labs revealed its 2013 threat predictions, highlighting six threats to watch out for next year. 1. APTs Target Individuals through mobile platforms APTs also known …

Exploit kit authors thrive due to PoC code released by whitehats

Do exploit kit authors actually write the exploits they include in their offerings? Sophos’ researcher Gabor Szappanos says the answer is a resounding “No.” …

80% of attacks are redirects from legitimate sites

Sophos released its Security Threat Report 2013, a detailed and interactive assessment of what’s happened in IT security for 2012 and what’s expected for 2013. …

Researcher releases a slew of MySQL and SSH exploits

Security professional Nikolaos Rangos, who is better known by his online handle Kingcope, has flooded the Full Disclosure mailing list over the weekend with information and …

Bogus Apple invoice leads to Blackhole, banking malware

If you receive an invoice seemingly coming from Apple that apparently shows that your credit card has been billed for $699,99 (or a similar preposterously huge amount of …

Blackhole exploits lead a black month for malware

In October, GFI Software threat researchers uncovered a large number of Blackhole exploits disguised as Windows licenses (just prior to the release of Windows 8), Facebook …

Opera homepage spotted redirecting visitors to Blackhole kit

If you are an Opera user who hasn’t changed the browser homepage or has visited Opera’s Portal homepage (portal.opera.com) on Wednesday, you might want to check …

Adobe Reader 0-day exploit sold for $50,000

The good news is that the exploit costs $50,000 which limits the purchase of it to defense contractors, nation states and some criminal organizations that may be able to …

Life cycle and detection of an exploit kit

As the process of owning systems and dragging them into botnets becomes ever more commercialized, exploit kits have emerged as a favorite of attackers. Their point-click-own …

Can the Nuclear exploit kit dethrone Blackhole?

In a market dominated by the mega-popular Blackhole exploit kit (newly upgraded to version 2.0) and the somewhat less sought-after Eleonore and Phoenix exploit packs, can the …

New cybercrime monetization methods

AVG’s new report investigates a number of malicious software developments including the newly launched 2.0 version of the Blackhole Exploit Toolkit, the evolution in …

Don't miss

Cybersecurity news