A while back we wrote about the Neutrino exploit kit performing fingerprinting checks to weed out security researchers and honeypots attempting to catch…

In the cybercrime landscape, Exploit Kits (EKs) are the tool of choice to infect endpoints by exploiting software vulnerabilities. However, a…

In the past few weeks we’ve talked about the Neutrino and Magnitude exploit kits. This time, we take a look at…

While overall exploit kit activity has been somewhat low during the past weeks, we have noted some changes in Neutrino, the leading…

Since the disappearance of Angler EK, exploit kit activity is at one of its lowest it has been in a long…

For those tracking exploit kits, the disappearance of the Angler exploit kit last week was a major event. While a lot of…

We’ve spotted a distribution channel for the Neutrino exploit kit which starts with malicious iframe injections. Digging a little more, we found…

This is an overview of the most popular exploit kits that we have caught in our honeypots in the past few weeks and have…

There has been a lot of talk about Nuclear EK recently, following Sucuri’s discovery about a large number of WordPress sites…

During the past few days we have noticed a higher than usual number of malvertising attacks pushing the Magnitude exploit kit –…