May 20, 2015 Storm Kit – Changing the rules of the DDoS attack Background Distributed denial of service (DDoS) is one of the most commonly used cybercriminal methods. ...
May 14, 2015 Analysis of the Havij SQL Injection tool Havij, an automatic SQL Injection tool, is distributed by ITSecTeam, an Iranian security company. The ...
Research May 12, 2015 The 1st Step to Stopping the Next Massive Cyberattack: Assess Given the ever-increasing sophistication of cybercrime methods, organizations must employ advanced assessment tools and practices ...
May 12, 2015 The Microsoft Help File (.chm) May Enslave You “Microsoft Compiled HTML Help” is a Microsoft proprietary online help format that consists of a ...
Security May 7, 2015 The Latest SQL Injection Trends SQL injection attacks, in which malicious SQL statements are inserted into an entry field for ...
April 29, 2015 Threat Alert: WordPress Cross-Site Scripting Overview The WordPress content management system used by millions of websites is vulnerable to ...
April 16, 2015 Check Point Threat Alert – Simda Overview The Simda botnet is a network of computers infected with self-propagating malware which ...
Research April 16, 2015 Protecting Beyond the Point of Sale The sad reality is that retail breaches are becoming too common. With over a billion ...
April 15, 2015 Check Point Threat Alert: AAEH/Beebone Overview AAEH, also known as BeeBone, is a family of polymorphic downloaders created with ...
March 31, 2015 Volatile Cedar – Analysis of a Global Cyber Espionage Campaign Today, we announced the discovery of Volatile Cedar, a persistent attacker group originating possibly in ...