<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Detection Doesn't Stop Attacks, So I'm Joining Menlo Security

Posted by Jason Steer on Jul 14, 2015

detection-dead

Today I joined Menlo Security and the reason is simple: After spending more than a decade in the security industry it’s become clear that detection-based security technologies are losing the war against cyber attacks. By joining Menlo Security I’ll be able to help organisations to end attacks delivered via Web and email and push the major fronts of the cyber war back outside of their enterprises.

Read More

Tags: malware, phishing, flash, java, Detection

Pawn Storm: The Return Of Java 0days

Posted by Kowsik Guruswamy on Jul 13, 2015

Dubbed "Operation Pawn Storm," this series of attacks targets military officials as well as various defense contractors. This campaign follows a common playbook (see Rombertik - Rise of Self Aware Malware) of infecting a Website (or typosquatted domain), making it a phishing site, then targets a small group of users - in this case NATO & US defense organization personnel - with spear-phishing emails. Hackers then deliver malware through legitimate Websites using malicious iframes injected into them. Checkout the Trend Micro's analysis from 2014 on Operation Pawn Storm for more details. 

Read More

Tags: malware, phishing, java

Connect with us

Lists by Topic

see all

Recent Posts

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.