advertising

Videoscape-Powered Advertising + Linear TV: a Winning Combination

3 min read

Read some of the press covering digital media today, and you’d think that TV advertising is going the way of the dinosaurs. After all, web and mobile advertising lets you slice and dice your ads to target narrow audiences in a way that hasn’t been possible with TV, where historically, targeting meant finding programs that […]

Addressable ads – getting them right the first (and second) time

2 min read

A generation ago, part of the TV viewing experience was an unstated compact that in exchange for content, viewers would be subject to a certain amount of advertising. These ads may or may not have been relevant, but viewers nonetheless sat through them – what choice did they have? These days, service providers have moved […]

May 19, 2014

SECURITY

Angling for Silverlight Exploits

6 min read

This post is co-authored by Andrew Tsonchev, Jaeson Schultz, Alex Chiu, Seth Hanford, Craig Williams, Steven Poulson, and Joel Esler. Special thanks to co-author Brandon Stultz for the exploit reverse engineering.  Silverlight exploits are the drive-by flavor of the month. Exploit Kit (EK) owners are adding Silverlight to their update releases, and since April 23rd we have […]

May 12, 2014

EXECUTIVE PLATFORM

IoE Takes to the Highway (and not how you think!) to Transform Marketing

1 min read

You’ve heard us talk a lot about the major value at stake – or increased revenue and reduced business costs – around the Internet of Everything (IoE) for the public sector and various industries including retail, healthcare and manufacturing. But what about the one nearest and dearest to my heart — the marketing and advertising […]

April 15, 2014

SECURITY

Year-Long Exploit Pack Traffic Campaign Surges After Leveraging CDN

7 min read

Anyone can purchase an exploit pack (EP) license or rent time on an existing EP server. The challenge for threat actors is to redirect unsuspecting web browsing victims by force to the exploit landing page with sustained frequency. Naturally, like most criminal services in the underground, the dark art of traffic generation is a niche specialty that must be purchased to ensure drive-by campaign success. For the past year we have been tracking a threat actor (group) that compromises legitimate websites and redirects victims to EP landing pages. Over the past three months we observed the same actor using malvertising - leveraging content delivery networks (CDNs) to facilitate increased victim redirection - as part of larger exploit pack campaigns.