简体版 繁體版 English 한국어
登録 ログイン

exploit kitの例文

例文モバイル版携帯版

  • In January 2014, malicious ads on the newspaper's website redirected visitors to an exploit kit landing page.
  • Exploit kits that have been named include the MPack, Phoenix, Blackhole, Crimepack, RIG and Angler exploit kits.
  • Exploit kits that have been named include the MPack, Phoenix, Blackhole, Crimepack, RIG and Angler exploit kits.
  • In 2012, the LA Times was hit by a massive malvertising attack which used the Blackhole exploit kit to infect users.
  • Exploit kits are often encoded, instead of in plain PHP, to prevent unlicensed use and complicate anti-malware analysis.
  • The exploit kit gathers information on the victim machine, finds vulnerabilities and determines the appropriate exploit, and delivers the exploit, which typically silently drive-by downloads and executes malware.
  • The "'Blackhole exploit kit "'is as of 2012 the most prevalent web threat, where 29 % of all web threats detected by Sophos and 91 % by spam runs.
  • A study by Solutionary s Security Engineering Research Team ( SERT ) found about 70 % of exploit kits released in Q4 2012 come from Russia, followed by China and Brazil, with 20 % not attributed.
  • In February 2013, a ransomware Trojan based on the Stamp . EK exploit kit surfaced; the malware was distributed via sites hosted on the project hosting services SourceForge and GitHub that claimed to offer " fake nude pics " of celebrities.
  • "' 2011 "': " Spotify " had a malvertising attack which used the Blackhole exploit kit  this was one of the first instances of a drive-by download, where a user doesn t even have to click on an ad to become infected with malware.