Exploit kits

Hacking Team Another Flash Zero-Day: CVE-2015-5122

Following the Hacking Team data breach, yet another Adobe Flash Player zero-day vulnerability has been found actively exploited in-the-wild. Another…

9 years ago

A new Zero-Day Vulnerability arises from Hacking Team hack

Security Researchers at Trend Micro have discovered a second Zero-Day Vulnerability that arises from Hacking Team cyber attack. Just Three…

9 years ago

Cybercrime is paying with 1,425% return on investment

Trustwave firm published a report related to 2014 incidents that revealed cyber criminal activities are paying with 1,425% return on…

9 years ago

A global operation took down the Simda botnet

Law enforcement dismantled the Simda botnet in an international joint effort that involved also most important private security firms. Another…

9 years ago

Compliance: An Often Overlooked, Powerful Method of Threat Prevention

Which are different components that must be taken into consideration  to build an efficient information security foundation and prevent cyber…

9 years ago

Why Adobe issued the Out-of-Band Flash Player Update for CVE-2014-8439?

Adobe has released yesterday an out-of-band update to fix a critical remote code-execution vulnerability CVE-2014-8439 in Flash Player that is…

9 years ago

Zero-day market, the governments are the main buyers

Governments, and in particular US one, are principal buyers of zero-day vulnerabilities according a report published by Reuters. Zero-days exploits…

11 years ago

Anonymous #OpIsrael, use of botnets & hypothesis on attackers

We all remember the debated attacks of Anonymous collective against Israeli government that targeted various websites of the country last…

11 years ago

Wandering in the underground, from exploit kits to hacking services

The cybercrime industry knows no crisis, new services are offered in the underground and criminals operating in different sectors are…

11 years ago

Threat Intelligence Report by Solutionary, rise of cyber attacks

Continues my overview of the main security reports published by leading companies that produce interesting analysis on the analysis of…

11 years ago

This website uses cookies.