‘Malware-infected hosts as stepping stones’ service offers access to hundreds of compromised U.S based hosts by Blog Staff | Aug 2, 2013 | Industry Intel, Threat Lab Reading Time: ~ 3 min.
DIY commercially-available ‘automatic Web site hacking as a service’ spotted in the wild by Blog Staff | Jul 31, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Custom USB sticks bypassing Windows 7/8’s AutoRun protection measure going mainstream by Blog Staff | Jul 30, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
How much does it cost to buy one thousand Russian/Eastern European based malware-infected hosts? by Blog Staff | Jul 29, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Rogue ads lead to the ‘Free Player’ Win32/Somoto Potentially Unwanted Application (PUA) by Blog Staff | Jul 26, 2013 | Industry Intel, Threat Lab Reading Time: ~ < 1 min.
Fake ‘Copy of Vodafone U.K Contract/Your Monthly Vodafone Bill is Ready/New MMS Received’ themed emails lead to malware by Blog Staff | Jul 25, 2013 | Industry Intel, Threat Lab Reading Time: ~ < 1 min.
Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilities by Blog Staff | Jul 24, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Protected: Deceptive ‘Media Player Update’ ads expose users to the rogue ‘Video Downloader/Bundlore’ Potentially Unwanted Application (PUA) by Blog Staff | Jul 23, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Yet another commercially available stealth Bitcoin/Litecoin mining tool spotted in the wild by Blog Staff | Jul 22, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Rogue ads targeting German users lead to Win32/InstallBrain PUA (Potentially Unwanted Application) by Blog Staff | Jul 19, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
New Mac Malware Uses Right-to-Left Override To Trick Users by Blog Staff | Jul 18, 2013 | Industry Intel, Threat Lab Reading Time: ~ 3 min.
New commercially available Web-based WordPress/Joomla brute-forcing tool spotted in the wild by Blog Staff | Jul 17, 2013 | Industry Intel, Threat Lab Reading Time: ~ 3 min.