This report explores recent exploit trends, analyzes prevalent and common exploits, and summarizes current and future mitigation strategies for preventing and recovering from exploit-based attacks.
I want to...
Advanced persistent threats (APTs) use malicious programs combined with hacking tools and techniques directed at a specific target and with a well-defined motivation. This report looks at the lifecycle of APTs, their defining characteristics, and recommendations to protect enterprises from them.
This month’s report highlights the most prevalent unwanted software, and discusses how we are working with the software development industry to better detect unwanted applications.
This month’s report highlights the most prevalent ransomware that we’ve seen affect both consumers and enterprises across the globe, new ransomware that we’ve seen emerge, and how some of their behaviors are changing.
Windows 10 brings a number of advances and features over previous Windows operating systems. This report details the new technologies and features that are included in Windows Defender in Windows 10.
Macro-based malware uses macros embedded in Microsoft Office files to sneak in further infection. This report includes the following sections:
Rootkits provide stealth capabilities to malware. This report examines how attackers use rootkits, and how rootkits function on affected computers.
This report examines the prevalent EyeStye family of malware.
This report provides an overview of the Win32/Poison (Poison Ivy) family of malware.
This special edition of the SIR provides an overview of the Win32/Rustock family of rootkit-enabled backdoor trojans.
This report provides an overview of the Win32/Qakbot (Qakbot) family of malware.
This document provides an overview of the Win32/Zbot family of password-stealing trojans.