Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email: dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR: danchodanchev@xmpp.jp | TOX ID: 2E6FCA35A18AA76B2CCE33B55404A796F077CADA56F38922A1988AA381AE617A15D3D3E3E6F1
Wednesday, June 06, 2012
Summarizing Webroot's Threat Blog Posts for May
The following is a brief summary of all of my posts at Webroot's Threat Blog for May, 2012. You can subscribe to my Webroot's Threat Blog RSS Feed or follow me on Twitter:
01. London’s InfoSec 2012 Event – recap
02. Managed SMS spamming services going mainstream
03. A peek inside a boutique cybercrime-friendly E-shop
04. Cybercriminals release ‘Sweet Orange’ – new web malware exploitation kit
05. Spamvertised ‘Pizzeria Order Details’ themed campaign serving client-side exploits and malware
06. Poison Ivy trojan spreading across Skype
07. A peek inside a managed spam service
08. Ongoing ‘LinkedIn Invitation’ themed campaign serving client-side exploits and malware
09. Spamvertised bogus online casino themed emails serving adware
10. Spamvertised ‘YouTube Video Approved’ and ‘Twitter Support” themed emails lead to pharmaceutical scams
11. A peek inside a boutique cybercrime-friendly E-shop – part two
12. Spamvertised CareerBuilder themed emails serving client-side exploits and malware
13. Pop-ups at popular torrent trackers serving W32/Casonline adware
14.‘Windstream bill’ themed emails serving client-side exploits and malware
This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter.
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Summarizing ZDNet's Zero Day Posts for May
The following is a brief summary of all of my posts at ZDNet's Zero Day for May, 2012. You can subscribe to my personal RSS feed, Zero Day's main feed, or follow me on Twitter:
01. Is Mozilla's Firefox 'click-to-play' feature a sound response to drive-by malware attacks?
02. Rogue Firefox extension hijacks browser sessions
03. Spamvertised 'PayPal payment notifications' lead to client-side exploits and malware
04. Israeli Institute for National Security Studies compromised, serving Poison Ivy DIY malware
05. Researchers spot new Web malware exploitation kit
06. 2012 Olympics themed malware circulating in the wild
07. New ransomware impersonates the U.S Department of Justice
08. Localized ransomware variants circulating in the wild
09. Cybercriminals offer bogus fraud insurance services
10. Researchers spot fake mobile antivirus scanners on Google Play
11. The cyber security implications of Iran's government-backed antivirus software
12. Q&A of the week: 'The current state of the cyber warfare threat' featuring Jeffrey Carr
13. Researchers intercept Tatanga malware bypassing SMS based transaction authorization
14. New SpyEye plugin takes control of crimeware victims' webcam and microphone
15. Comcast phishing site contains valid TRUSTe seal
16. Q&A of the Week: 'The current state of the cybercrime ecosystem' featuring Mikko Hypponen
This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter.
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Subscribe to:
Posts (Atom)