Ransomware has already raked in around US$209 million from enterprises alone in the first quarter of 2016. Unfortunately, it's just one of the many possible threat types that exploit kits can deliver to vulnerable systems.
This research paper highlights the flaws of the WPAD protocol, describes how it works, and why it is a serious security concern, especially under the altered conditions in today’s connected world. Read more
Various business websites were recently hijacked to deliver crypto-ransomware to visitors. Why do attackers repeat the cycle of compromising legitimate websites via exploit kits, malware and vulnerable software? Read more
A cross-site scripting (XSS) vulnerability found in the Jetpack plug-in of the popular content management system WordPress puts over a million websites using it at risk of getting their admin accounts hijacked. Read more