Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 06/19/15 in all areas

  1. Exploit Kits: Past, Present and Future March 16, 2015 View research paper: The Evolution of Exploit Kits Exploit kits are a fast-growing online threat that cybercriminals seem to have favored in the last few years to execute Web-based attacks to distribute malware. Exploit kits are old tools released by Russian programmers dating back to 2006. As seen in the diagram below, exploit kits have continuously grown in numbers from 2006 to 2013. The market seemingly changed and took a significant dip however in 2014. The rise of exploit kits in underground markets push exploit kit developers to improve the stealth and efficiency of their products and services. Currently, there are 70 different exploit kits found in the wild, taking advantage of more than a hundred vulnerabilities. What is an Exploit Kit? Exploit kits are programs or more often scripts that exploit vulnerabilities in programs or applications. The most prevalent exploits are browser exploits that enable the download of malicious files. Exploits introduce code to victims’ computers that then downloads and executes a malicious file. Several kits have since been developed and sold or rented out like commercial products in underground markets. The easiest hack toolkit made available in the crimeware market on record was seen sometime in 2006. A typical exploit kit usually provides a management console, several vulnerabilities targeted to different applications, and several add-on functions that make it easier for a cybercriminal to launch an attack. The Timeline Record of Exploit Kits The following research paper discusses the following: Exploit Kit Attack Scenario – there are four stages that illustrate how a typical attack scenario happens. Detailed below, the stages include contact, redirect, exploit, and finally, infect. Overview of 2014 Exploit Kit Activity – this section discusses the exploit kit trends traced back from 2006 to 2014, including its threat distribution. Exploit Kits are presently one of the most popular types of Web attack toolkits thriving in the cybercriminal underground market, and we predict that exploit kits will be more prevalent in 2015. Internet Explorer, Adobe Flash, and Adobe Reader are the most common software targeted by cybercriminals. Exploit kits pose serious security risks to all computer users ranging from private users to corporate networks. As such, it is critical to know and understand how exploit kits work, where they came from, what are the current trends, and how to defend against them. NO-MERCY Regards Source : Exploit Kits: Past, Present and Future - Security News - Trend Micro USA
    1 point
  2. Deoarece a înc?lcat regulile de la sec?ia de V.I.P. s-a decis la Area51 s? i se retrag? titlul lui Aerosol(a f?cut leakeage de informa?ii de acolo). Kronzy este ?i el vizat, o s? stabilim dac? acela?i lucru i se va aplica ?i lui. S? nu-mi trimite?i PM-uri c? nu le citesc, to?i am luat unanim decizia asta, cineva trebuia doar s? aplice ?i s-a întâmplat s? fiu eu. Tot ce-i de postat pe aceast? tem? se va posta aici. Chestia asta s-a întâmplat rar, cine a primit VIP a f?cut-o pentru c? ne-a câ?tigat încrederea iar pentru astfel de comportamente cu greu s-a recâ?tigat. Asta nu înseamn? c? pe viitor nu se poate schimba placa, Gecko a devenit iar moderator dup? câteva alterca?ii cu unii membri din staff.
    1 point
  3. Ce s? spun decât la mul?i ani!? Sper s? te coci cât mai devreme dac? vrei s?-?i faci carier? în acest domeniu. M? îndoiesc cât e?ti de pasionat de informatic? ?i securitate întrucât tot ce face e doar ca s? atragi aten?ie. Ia caut? tu s? te respecte al?ii prin ceea ce faci f?r? s? fie nevoie s? te afi?ezi, atunci o s? conteze.
    1 point
  4. V? merita?i ?epele luate. Azi beau ?i m? doare'n pulex ! @moldovean LE: M? doare'n cuc de dislike-uri, oricum beau
    -1 points
  5. @Aerosol:Inceteaza sa te mai plangi ca o pizda,recunoaste ca ai gresit si gata.
    -1 points
×
×
  • Create New...