Read some of the press covering digital media today, and you’d think that TV advertising is going the way of the dinosaurs. After all, web and mobile advertising lets you slice and dice your ads to target narrow audiences in a way that hasn’t been possible with TV, where historically, targeting meant finding programs that […]
A generation ago, part of the TV viewing experience was an unstated compact that in exchange for content, viewers would be subject to a certain amount of advertising. These ads may or may not have been relevant, but viewers nonetheless sat through them – what choice did they have? These days, service providers have moved […]
Mobility trend in Hospitality A recent TripAdvisor survey found that over 40% of travelers use their smart phones to plan a trip and over 46% use their smart...
This post is co-authored by Andrew Tsonchev, Jaeson Schultz, Alex Chiu, Seth Hanford, Craig Williams, Steven Poulson, and Joel Esler. Special thanks to co-author Brandon Stultz for the exploit reverse engineering. https://www.youtube.com/watch?v=Yrc0U3pjVZM Silverlight exploits are the drive-by flavor of the month. Exploit Kit (EK) owners are adding Silverlight to their update releases, and since April 23rd we […]
You’ve heard us talk a lot about the major value at stake – or increased revenue and reduced business costs – around the Internet of Everything (IoE) for the public sector and various industries including retail, healthcare and manufacturing. But what about the one nearest and dearest to my heart — the marketing and advertising […]
Anyone can purchase an exploit pack (EP) license or rent time on an existing EP server. The challenge for threat actors is to redirect unsuspecting web browsing victims by force to the exploit landing page with sustained frequency. Naturally, like most criminal services in the underground, the dark art of traffic generation is a niche specialty that must be purchased to ensure drive-by campaign success. For the past year we have been tracking a threat actor (group) that compromises legitimate websites and redirects victims to EP landing pages. Over the past three months we observed the same actor using malvertising - leveraging content delivery networks (CDNs) to facilitate increased victim redirection - as part of larger exploit pack campaigns.