The Latest in IT Security

Posts Tagged ‘Obfuscation’

Since Blackhole Exploit Kit 2.0 was recently introduced, we wanted to give our readers a few examples of how they might get exposed to this threat through email. Websense® ThreatSeeker® Network has recently intercepted a few malicious email campaigns that try to lure the victims to Web pages that host this popular exploit kit. Some of the themes […]

Read more ...

Thanks to Denis Carmody for his assistance with this research.In June we blogged about a new version of the threat family that targeted Spanish companies and institutions named Trojan.Exprez.B. More recently, we have encountered a new version of Trojan.Exprez.B that targets companies in The Netherlands and Denmark. It is still the same threat, but with […]

Read more ...


Categories

SUNDAY, APRIL 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments