Security Alerts & News
by Tymoteusz A. Góral

#1679 Inside the RIG exploit kit
Today’s most prolific exploit kit is RIG, which has filled a void left by the departure of Angler, Neutrino and Nuclear. That has made it public enemy No. 1 when it comes exploit kits. Now Cisco Talos researchers are hoping to shed new light into the ongoing development of the potent EK in hopes of neutralizing the RIG EK threat.

As with the unraveling of any EK, one of the keys to stopping infection rates is determining infection routes and how adversaries bypass security software and device.

In a deep analysis of RIG, Cisco Talos team outlined recently the unique nature of the exploit kit. In a nutshell, like other exploit kits the crew behind RIG are using gates to redirect their victims to their exploit kit. But what makes RIG unique, according Cisco Talos researchers is the way RIG combines different web technologies, such as DoSWF, JavaScript, Flash and VBscript to obfuscate the attack.
Read more
#1681 Tesco Bank: 20,000 customers lose money
#1680 Admins, update your databases to avoid the MySQL bug
#1679 Inside the RIG exploit kit
#1678 Test-run DDoS attacks against Liberia cease
#1677 Android spyware targets business executives
#1676 Microsoft delays Enhanced Mitigation Experience Toolkit support cut-off to July 2018
#1675 New Bizarro sundown exploit kit spreads Locky
#1674 This evil office printer hijacks your cellphone connection
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12