Security News

An unknown attacker has managed to modify the name servers assigned to 751 domains, which resulted in some visitors to the hijacked domains being redirected to a site hosting the Rig Exploit Kit...

Writing the obituary for the lifeless Neutrino exploit kit leads the latest edition of the ISMG Security Report. Also, judging the value of the Department of Health and Human Services'...

Poor Profits May Have Driven Developers Out of Botnet-Building BusinessGood news: The Neutrino botnet - once a major exploit kit player - appears to have disappeared from the cybercrime scene....

A group of researchers and security firms led by RSA delivered a significant blow to the infrastructure used by the notorious RIG exploit kit and the operation has allowed experts to learn more...

GoDaddy, along with researchers from RSA Security and other companies, shut down tens of thousands of illegal established subdomains tied to the RIG Exploit Kit.


The Terror exploit kit has matured into a greater threat and carefully crafts attacks based on a user's browser environment.


Here are the exploit kits to watch for over the next three to six months.
