Exploit kit traffic is down considerably following the demise of Nuclear and Angler, but many researchers see it only as a temporary disruption.
September 26, 2016
Turnkey exploit kits -- built in with malware infection mechanisms and distribution channels, command and control infrastructure, and everything a cybercriminal would need to attack users for the sake of data theft and other nefarious purposes -- have long been the bane of the cybersecurity landscape.
These kits put cutting-edge technical capabilities at the fingertips of crooks with very little geek cred but open pocketbooks, broadening the possibilities of wide-scale infection for profit.
On the good-news front, exploit kits have seen a massive slowdown in 2016. However, on the not-so-good-news front, many researchers believe that it is only a matter of time before the criminals pick up the pace again.
About the Author(s)
You May Also Like
The fuel in the new AI race: Data
April 23, 2024Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024