Cybersecurity had a turbulent 2016, to say the least. We saw the rise of ransomware, the emergence of IoT botnets, landmark security legislation and Yahoo’s disclosure about its 1-billion-record-hack, the largest in history.
Read MoreThe recent FireEye discovery of an Angler Exploit Kit variant that bypasses Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) has taken the cyber security world by surprise – but it shouldn’t have. New variants of the Angler EK crop up constantly (see Javascript in IE Overtakes Flash as Number One Target for Angler Exploit Kit) and EMET was never meant to be infallible, just make it more difficult for hackers. EMET, which uses a set of predefined rules to prevent specific malware, is often relied upon to stop zero-day attacks on Windows systems until a patch is developed for the vulnerability. Although researchers have previously discovered vulnerabilities that allowed them to bypass EMET defenses, this is the first time an exploit in the wild has been successful.
Read MoreIn Morphisec labs, we are constantly tracking the behavior of the exploit kits that are making life easy for hackers and complicated for security managers. Since the EKs need to take advantage of whatever vulnerability they can find on an end user’s device, they typically have a roster of vulnerabilities to try, and if the first one does not work, they go on to the next one.
Read MoreSubscribe to our blog
Stay in the loop with industry insight, cyber security trends, and cyber attack information and company updates.
Search Our Site
Recent Posts
Posts by Tag
- Cyber Security (77)
- Endpoint Security (60)
- Attack Analysis (39)
- Cyber Attacks (39)
- Moving Target Defense (31)
- Company News (30)
- Exploits (28)
- Ransomware (16)
- APT (14)
- CISO (14)
- Events (14)
- Fileless Attacks (13)
- Threat Alerts (13)
- Zero-day (13)
- Industry News (12)
- Research (11)
- Threat Profile (11)
- 0-day exploits (8)
- Patching (8)
- Product (8)
- Sandbox evasion (6)
- Exploit Kit (5)
- Mordechai Guri (5)
- Morphisec Labs (5)
- ASLR (4)
- Custom Packer (4)
- Cyber Security Predictions 2017 (4)
- VDI (4)
- Angler Kit (3)
- Case Study (2)
- MLTR (2)
- MS Office Exploits (2)
- Malspam (2)
- Threat Report (2)
- Webinars (2)
- Cerber (1)
- FIN7 (1)
- FlawedAmmyy (1)
- GDPR (1)
- Hancitor (1)
- Kovter (1)
- SecOps (1)