The rapid evolution of cybercrime has brought forth a new era of sophisticated phishing operations, with attackers now leveraging complex “Phishing-as-a-Service” (PhaaS) platforms to target lucrative enterprise networks. One such operation, identified in research as Storm-1575 and more widely...
Original release date: October 13, 2015
Systems Affected
Microsoft Windows
Overview
Dridex, a peer-to-peer (P2P) bank credential-stealing malware, uses a decentralized network infrastructure of compromised personal computers and web servers to execute command-and-control (C2). The United...
Link Removed
The cross-site scripting filter that ships with Microsoft’s Internet Explorer 8 browser can be abused by attackers to launch cross-site scripting attacks on websites and web pages that would otherwise be immune to this threat.
According to a Link Removed at this year’s Black Hat...
attacks
bing
browser
cookies
credentials theft
cross-site scripting
filters
google
internet explorer
keystrokelogging
microsoft
profiles
regular expressions
response alteration
risks
security
twitter
web defacement
wikipedia
xss