Networks are relentlessly attacked by online threats. Organizations need quality security products to keep their network secure. When Jothan Virgil, an IT Administrator at Alabama State University located in Montgomery, Alabama, got an email announcing the new, free Avast for Business product, he did his research and signed up. Virgil knows that a good antivirus product is […]
Symantec telemetry shows surge in spam messages mentioning Ashley Madison megabreach.Read More
Symantec’s investigation uncovers additional modules for the Regin spying tool and finds advanced infrastructure supporting it.Read More
Sundown 悪用ツールキットは、CVE 2015-2444 の脆弱性に対する悪用コードをいち早く統合し、最近の水飲み場型攻撃に利用しています。Read More
Android を狙うランサムウェアは、検出をすり抜け解析を回避する手口を使っています。その一部をご紹介します。Read More
The Sundown exploit kit has been the first to integrate an exploit for the CVE 2015-2444 bug, using it in a recent watering-hole attack.Read More
A look at some of the detection-evasion and anti-analysis tactics employed by Android ransomware.Read More
Microsoft が昨日パッチを公開したばかりの脆弱性(CVE-2015-2502)が、Korplug マルウェアを拡散する水飲み場型攻撃にすでに悪用されていました。Read More
Security Response News
Backdoor.Korplug ,
Endpoint Protection (AntiVirus) ,
Hacktool ,
internet explorer ,
microsoft ,
security ,
Security Response ,
Trojan.Gen.2 ,
Trojan.Malscript ,
Vulnerabilities & Exploits ,
Zero-Day
Bug patched by Microsoft yesterday (CVE-2015-2502) has already been exploited in watering hole attacks to deliver Korplug malware.Read More
Security Response News
Backdoor.Korplug ,
Endpoint Protection (AntiVirus) ,
Hacktool ,
internet explorer ,
microsoft ,
security ,
Security Response ,
Trojan.Gen.2 ,
Trojan.Malscript ,
Vulnerabilities & Exploits ,
Zero-Day
Windows Update または Microsoft Download Center を使って、CVE-2015-2502 への予防対策をとってください。Read More