-
Threat Spotlight: Sundown Matures
Threat ResearchThis post authored by Nick Biasini with contributions from Edmund Brumaghin and Alex Chiu The last time Talos discussed Sundown it was an exploit kit in transition. Several of the
Read More -
Take the RIG Pill: Down the Rabbit Hole
Threat ResearchExecutive Summary Talos is monitoring the big notorious Exploit Kits(EK) on an ongoing basis. Since Angler disappeared a few month ago, RIG is one EK which seems to be trying
Read More -
Sundown EK: You Better Take Care
Threat ResearchThis post was authored by Nick Biasini Over the last six months the exploit kit landscape has seen some major changes. These changes began with Nuclear ceasing operations in April/May
Read More -
Talos ShadowGate Take Down: Global Malvertising Campaign Thwarted
Threat ResearchYet another example of how organizations work together to stop threats affecting users around the globe.
Read More -
Connecting the Dots Reveals Crimeware Shake-up
Threat ResearchThis Post Authored by Nick Biasini For a couple of weeks in June the threat landscape was changed. Several high profile threats fell off the landscape, causing a shake-up that
Read More -
Angler Catches Victims Using Phish as Bait
Threat ResearchThis post authored by Nick Biasini with contributions from Erick Galinkin. Exploit kits have been a recurring threat that we’ve discussed here on this blog as a method of driving
Read More -
Threat Spotlight: Spin to Win…Malware
Threat ResearchThis post was authored by Nick Biasini with contributions from Tom Schoellhammer and Emmanuel Tacheau The threat landscape is ever changing and adversaries are always working to find more efficient
Read More -
Flash 0-day Exploited by Angler Exploit Kit
Threat ResearchThis post was authored by Nick Biasini, Earl Carter and Jaeson Schultz Flash has long been a favorite target among Exploit Kits (EK). In October 2014 the Angler EK was
Read More -
Happy New Exploit Kits! (I mean Happy Belated New Year!)
SecurityThis article discusses the increasing prevalence of exploit kits and drive-by exploits being leveraged by cyber criminals to spread malware quickly and effectively. It also highlights the use of Cisco
Read More