Web Attacks
Security researchers have noted a sudden increase in Tor traffic during the latter part of August 2013. According to reports, the reason for this notable spike is the botnet known as MEVADE, which ado...
One of the prevalent exploit kits in the cybercrime today is Blackhole Exploit Kit (BHEK), which used spammed message that looks exactly like the legitimate email and leverages relevant and timely top...
Recent mobile vulnerabilities signal the growth and evolution of the mobile threat landscape. In our 2Q 2013 Security Roundup, we pointed out two new and sophisticated vulnerabilities in Android.
PE_EXPIRO is a family of file infector malware first detected in 2010. In July 11, 2013, we detected a notable rise in PE_EXPIRO infections, most of which are coming from the US.
On June 25, 2013, South Korea was hit with a cyber attack that affected several local government and news sites. We managed to track some of the attacks that made up this event: (1) the compromise of ...
Parallels Plesk Panel or simply known as "Plesk" is a known hosting control panel created by Parallels. Web hosting companies and service providers use Plesk to enable their customers to host and mana...
A new malware detected as WORM_PIZZER.SM has recently been spotted creating copies of itself in archive files, specifically in .
In a reported incident, cybercriminals took advantage of note-taking service, Evernote, thus demonstrating their continued efforts to use legitimate services for malicious purposes. In doing so, cybe...
Botnets are one of the most effective means for cybercriminals to distribute malware and generate profit from unsuspecting users. The Asprox botnet, which first emerged in the threat landscape in 2007...