In the overwhelming sea of information, access to timely, insightful and independent open-source intelligence (OSINT) analyses is crucial for maintaining the necessary situational awareness to stay on the top of emerging security threats. This blog covers trends and fads, tactics and strategies, intersecting with third-party research, speculations and real-time CYBERINT assessments, all packed with sarcastic attitude
Monday, October 01, 2012
Summarizing Webroot's Threat Blog Posts for September
The following is a brief summary of all of my posts at Webroot's Threat Blog for September, 2012. You can subscribe to my Webroot's Threat Blog RSS Feed or follow me on Twitter:
01. Spamvertised ‘Wire Transfer Confirmation’ themed emails lead to Black Hole exploit kit
02. Intuit themed ‘QuickBooks Update: Urgent’ emails lead to Black Hole exploit kit
03. Cybercriminals resume spamvertising bogus greeeting cards, serve exploits and malware
04. Cybercriminals abuse Skype’s SMS sending feature, release DIY SMS flooders
05. New Russian service sells access to thousands of automatically registered accounts
06. Spamvertised ‘Your Fedex invoice is ready to be paid now’ themed emails lead to Black Hole Exploit kit
07. New Russian DIY SMS flooder using ICQ’s SMS sending feature spotted in the wild
08. Spamvertised ‘US Airways reservation confirmation’ themed emails serve exploits and malware
09. Cybercriminals impersonate FDIC, serve client-side exploits and malware
10. Managed Ransomware-as-a-Service spotted in the wild
11. A peek inside a boutique cybercrime-friendly E-shop – part four
12. New E-shop selling stolen credit cards data spotted in the wild
13. From Russia with iPhone selling affiliate networks
14. New Russian DIY DDoS bot spotted in the wild
This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter.
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Subscribe to:
Post Comments (Atom)


No comments:
Post a Comment