We research. You level up.
Exploits | Threat analysis
Say hello to Lord Exploit Kit
August 2, 2019 - In this blog, we take a look at a new exploit kit distributed via malvertising that calls itself Lord EK.
Read more
Exploit kits: spring 2019 review
May 14, 2019 - In this edition, we review active and unique exploit kits hitting consumers and businesses over the spring season.
Exploit kits: winter 2019 review
February 12, 2019 - We review the top exploit kits in this winter 2019 snapshot.
New critical vulnerability discovered in open-source office suites
February 6, 2019 - A security researcher recently published a proof of concept exploit for open-source office software LibreOffice and OpenOffice. Will this new vulnerability be used in the wild?
Improved Fallout EK comes back after short hiatus
January 17, 2019 - The Fallout exploit kit is back with some noteworthy improvements.
Underminer exploit kit improves in its latest iteration
December 21, 2018 - We take a look at some recent changes with the elusive Underminer exploit kit.
Exploit kits: fall 2018 review
October 24, 2018 - With a fresh exploit kit in town, the drive-by download landscape shows new signs of life in fall 2018.
Fake browser update seeks to compromise more MikroTik routers
October 12, 2018 - Threat actors are social engineering users with a fake update that, once installed, will scan the Internet in an attempt to exploit vulnerable MikroTik routers.
Buggy implementation of CVE-2018-8373 vulnerability used to deliver Quasar RAT
September 26, 2018 - A threat actor implements a newer vulnerability exploited in Internet Explorer to serve up the Quasar RAT and diversify the portfolio of attacks.
Contributors
Threat Center
Glossary
Scams
Write for Labs
Select your language
Cybersecurity basics
Your intro to everything relating to cyberthreats, and how to stop them.