State Of The Exploit KitState Of The Exploit Kit
Exploit kit traffic is down considerably following the demise of Nuclear and Angler, but many researchers see it only as a temporary disruption.
September 26, 2016
Already have an account?
Turnkey exploit kits -- built in with malware infection mechanisms and distribution channels, command and control infrastructure, and everything a cybercriminal would need to attack users for the sake of data theft and other nefarious purposes -- have long been the bane of the cybersecurity landscape.
These kits put cutting-edge technical capabilities at the fingertips of crooks with very little geek cred but open pocketbooks, broadening the possibilities of wide-scale infection for profit.
On the good-news front, exploit kits have seen a massive slowdown in 2016. However, on the not-so-good-news front, many researchers believe that it is only a matter of time before the criminals pick up the pace again.
About the Author
You May Also Like
Shifting Left: DevSecOps in the Cloud
Feb 4, 2025Uncovering Threats to Your Mainframe & How to Keep Host Access Secure
Feb 13, 2025Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025