vulnerabilities

QuickHealSecurity

Anatomy of Flash Exploit (CVE-2015-8651) integrated into Rig Exploit Kit

Credit to Author: Pavankumar Chaudhari| Date: Tue, 25 Apr 2017 08:58:48 +0000

We all know how the infamous RIG Exploit Kit have been used to infect the end users. We are seeing a constant spike in the usage of the RIG Exploit Kit by malware actors to spread malware. Its use has been noticed in different campaigns such as EITest, pseudoDarkleech, and…

The post Anatomy of Flash Exploit (CVE-2015-8651) integrated into Rig Exploit Kit appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read More
MalwareBytesSecurity

What are exploits? (And why you should care)

Credit to Author: Wendy Zamora| Date: Wed, 29 Mar 2017 14:00:25 +0000

At one point in the not-so-distant past, exploits were responsible for delivering 80 percent of malware to people’s systems. But exploits seem to be experiencing a lull today. Does this mean they’re gone for good or is this simply the calm before the storm? Let’s break down this stealthy threat so you can not only know your enemy, but also be appropriately prepared should the exploit attacks return.

Categories:

Tags:

(Read more…)

The post What are exploits? (And why you should care) appeared first on Malwarebytes Labs.

Read More