September 3, 2014

Malware Injected Directly Into Processes in Angler Exploit Kit Attack

“The typical exploitation workflow consists of a user arriving at a landing page that fires multiple exploits (Flash, Reader, Java, etc.) which in turn results in a malware payload being downloaded to the user’s machine and ran from a specific location, often within the temporary files’ folder,” Jerome Segura, senior security researcher at Malwarebytes, explained in an email.”

Read More

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.