The Latest in IT Security

Posts Tagged ‘legitimate web’

This week we have detected another interesting attack vector. This time cybercriminals are using an interesting technique for hiding malicious Javascripts and employ implicit iFrame injection. At this moment we are tracking hundreds of infected legitimate web sites in the Russian internet segment using this technique of infection. Let’s analyze this attack method step by […]

Read more ...

Analysis of the crypto used by the Trojan.Khan DDoS bot A recent blog post described our analysis of the crypto algorithm used by the Armageddon DDoS malware. This article continues our ongoing series on reversing the crypto mechanisms used by contemporary DDoS botnets; our guest of honor today will be a bot we have been […]

Read more ...

Linode feature so often on this blog that they have their own tag. OK, they’re not the worst hosting company in terms of malicious sites on their network, but at the moment they come up regularly. Now, sometimes a web host is purely black hat – they know exactly what their customers are up to […]

Read more ...


Categories

FRIDAY, MAY 03, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments