The Cisco Talos Group has performed in-depth research on the threat actors behind the Angler Exploit Kit, and even had behind-the-scenes access, allowing statistical information as well as Angler's inner-workings to be examined.
Experts discovered the attack platform used by the Winnti Group
Experts at Kaspersky have discovered that Winnti Group has enhanced its attack platform infecting organizations in South Korea, UK and Russia.
IT Security in SMEs: Guidelines published by UNICRI
The UNICRI published in September a new study about the security of Italian small and medium enterprises (SMEs), which are a very attractive target for crooks.
A viral vigilante may be keeping an eye on your home router
An old virus affecting routers and other devices running Linux appears to be acting as a digital vigilante, protecting routers in the dark alleyways of the Internet from other malware infections.
Patreon donor details apparently spilled after massive hack
Crowdfunding site Patreon has become the latest victim of a data breach, though this one's slightly more interesting than your garden variety hack. Patreon acknowledged the breach on September 30, saying that hackers gained access to names, email addresses, posts, and some shipping addresses, along with some billing addresses that added prior to 2014.
Encrypted Flash exploit bypassing vector mitigations
Researchers at Morphisec, an Israeli start-up focusing on polymorphic defense, a process that earned them kudos during the RSA Conference in 2014, have discovered a clever Flash bypass being used by the Nuclear exploit kit.
New Apple Gatekeeper bypass can allow running rouge applications
Patrick Wardle, director of research at Synack has already demonstrated another method, called Apple dylib hijacking, to bypass Apple GateKeeper.