Vulnerabilities and exploits

Research

No honor among thieves – even in Germany

A lot of tools and services change hands – for money in the criminal underground . For example bot-packs are offered by the creator or his business partners for a defined amount of money. The customer gets a package with all needed files and additional support, like updates against anti-virus…

Research

Adobe yet again

Vulnerabilities continue to be detected and successfully exploited in Adobe’s most popular products – Acrobat and Reader.

Some days ago we received an interesting PDF file (detected as Exploit.JS.Pdfka.bui) which contained an exploit for the CVE-2010-0188 vulnerability, which was…

Opinion

When too much is not enough too much

News has spread pretty quickly about the latest IE 0-day exploit (https://docs.microsoft.com/en-us/security-updates/securityadvisories/2010/981374). Unfortunately, in trying to publicize the quality of his employer’s product in relation to this new exploit, according to Ryan Naraine

Reports