Results for 'Tinba'

Exploits and vulnerabilities | News | Threats

Elusive HanJuan EK Drops New Tinba Version (updated)

June 24, 2015 - Update 07/03/15: AdFly contacted us and we are publishing their statement below: We are sorry for the inconvenience but this is...

CONTINUE READING
MALWARE

Info stealers

Short bio The term info stealer is self-explanatory. This type of malware resides in an infected computer and gathers data in...

CONTINUE READING
EXPLOIT KITS

HanJuan

Short bio HanJuan is a stealthy exploit kit specialized in exploiting vulnerabilities in Internet Explorer, Silverlight, and Adobe Flash Player. Their...

CONTINUE READING
Cybercrime | News

Catching Up With The ‘EITest’ Compromise, A Year Later

November 23, 2015 - We are seeing dozens of WordPress sites compromised recently with the same malicious code redirecting to the Angler exploit kit. The attack involves...

CONTINUE READING
News

A Week in Security (Aug 16 – Aug 22)

August 24, 2015 - Last week, we touched on the Ashley Madison data leak in two blog posts, offered a reaction to that Coby Persin...

CONTINUE READING
Cybercrime | News

Telstra Media’s Homepage Pushes Malvertising

August 21, 2015 - The media home page of Australia’s largest telecommunications company, Telstra, was pushing some malvertising similar to the attack we just documented on...

CONTINUE READING
News | Threats

Malvertising Hits Online Dating Site PlentyOfFish

August 20, 2015 - We detected a malvertising attack on popular dating site PlentyOfFish (POF) which draws over 3 million daily users. The attack chain uses...

CONTINUE READING
News

A Week in Security (Jun 07 – Jun 13)

June 15, 2015 - Last week, we published a timely scam, a malvertising campaign, the final section of the 2-part piece of a certain exploit kit, and a...

CONTINUE READING
Exploits and vulnerabilities | News | Threats

Exposing the Flash ‘EITest’ malware campaign

October 29, 2014 - Security incidents seldom are unrelated. Connecting those dots can help us better understand the underlying architecture and groups involved in cyber-crime. Since early...

CONTINUE READING