In the last weeks we discussed on the efficiency of exploit kits, malicious tool kits that allow to the attackers to exploit a huge quantity of vulnerabilities in victims systems. These products are largely diffused in the underground where is possible to find different tools usable for various purpose, most precious are those kit that […]