Results for 'Java'

MALWARE

Neutrino

Short bio The Neutrino exploit kit is a malicious tool kit, which can be used by attackers who are not experts...

CONTINUE READING
MALWARE

Exploit kits

Short bio An exploit kit is a toolkit designed to facilitate the exploitation of client-side vulnerabilities most commonly found in browsers...

CONTINUE READING
MALWARE

Worm

Short bio A computer worm is a type of Trojan that is capable of propagating or replicating itself from one system...

CONTINUE READING
EXPLOIT KITS

Angler

Short bio Angler was one of the leading exploit kits used by cybercriminals to distribute malware ranging from ransomware and banking...

CONTINUE READING
Personal

Chrome’s “Enhanced Ad Privacy”: What you need to know

September 10, 2023 - Users of Google’s Chrome web browser may wish to dig into their privacy settings as a new feature regarding advertising privacy slowly...

CONTINUE READING
News

Password-stealing Chrome extension smuggled on to Web Store

September 5, 2023 - Researchers at the University of Wisconsin–Madison have demonstrated that Chrome browser extensions can steal passwords from the text input fields in...

CONTINUE READING
Exploits and vulnerabilities | News

Update now! Google Chrome’s first weekly update has arrived

August 25, 2023 - Google has published details about the first weekly update for the Chrome browser. Recently Google announced that it would start shipping...

CONTINUE READING
Threat Intelligence

Catching up with WoofLocker, the most elaborate traffic redirection scheme to tech support scams

August 17, 2023 - Back in January 2020, we blogged about a tech support scam campaign dubbed WoofLocker that was by far using the most complex...

CONTINUE READING