Security News

Two recently published proof-of-concept exploits targeted Microsoft Edge were recently integrated into the Sundown Exploit Kit.

An exploit kit called DNSChanger is attacking routers, not browsers, through a malvertising campaign.

46% of the Internet’s top 1 million web sites, as ranked by Alexa, are risky. This is largely due to vulnerable software running on web servers and on underlying ad network domains, according to...

An Adobe Flash Player vulnerability used by the Sofacy APT gang was also found in seven of the top exploit kits, according to an analysis by Recorded Future.

NTP 4.2.8p9 includes a patch for a vulnerability that could crash ntpd with a single malformed packet.

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Researchers reveal WiFi-based mobile password discovery attack A group of researchers has come up...

CyberArk Labs unveiled new research detailing what it considers to be a significant risk across all Windows endpoints, including those on Windows 10 with Credential Guard enabled. The exploit...

The Internet of Things (IoT) is now a major force in the weaponization of DDoS. In 2016, IoT botnets have fueled a number of attacks, including the largest-ever DDoS attack, and that role will...


In a deep analysis of RIG, Cisco Talos team outlined the way the exploit kit combines different web technologies such as DoSWF, JavaScript, Flash and VBscript to obfuscate attacks.