Skip to content
Glock Enterprises
  • Welcome
  • Blog
  • Resources
  • Support

exploits

The DEA Didn’t Buy Malware From Israel’s Controversial NSO Group Because It Was Too Expensive

12th September 201912th September 2019 peterglock

The lesson from this is don’t assume that your mobile device is secure…: The U.S. Drug Enforcement Administration (DEA) did not buy hacking tools from malware company NSO Group because […]

 Android, Be Aware, cybersecurity, exploits, hacking, Information Security, iPhone, motherboard, WhatsApp, zero days  Glock Takes Stock

Say hello to Lord Exploit Kit

2nd August 20192nd August 2019 peterglock

Just as we had wrapped up our summer review of exploit kits, a new player entered the scene. Lord EK, as it is calling itself, was caught by Virus Bulletin‘s […]

 Be Aware, EK, eris, exploit kit, exploits, Lord EK, malvertising, Malwarebytes, njRAT, ransomware, Threat analysis  Glock Takes Stock

Exploit kits: summer 2019 review

30th July 201930th July 2019 peterglock

In the months since our last spring review, there has been some interesting activity from several exploit kits. While the playing field remains essentially the same with Internet Explorer and […]

 Be Aware, drive by, EK, EKs, exploit kits, exploits, Fallout, GreenFlash Sundown, Magnitude, Malwarebytes, RIG, Spelevo, Threat analysis, Underminer  Glock Takes Stock

Recent Posts

  • This phishing scam left thousands of stolen passwords exposed through Google search
  • Malware reportedly found on laptops given to children in England
  • Malwarebytes Hit by SolarWinds Hackers
  • Should I be worried about MFA-bypassing pass-the-cookie attacks?
  • Cyber security labelling scheme expanded to include all smart home devices

Get in touch

Email: [email protected]


View Glock Enterprises Ltd profile on Ariba Discovery

Data Protection Register

Registered with the ICO: ZA494319

About

Glock Enterprises Ltd. Registered in England & Wales No. 11183883

VAT No: GB 361 2795 89

All content (c) Glock Enterprises Ltd 2020

Pages

  • Blog
  • Privacy Policy
  • Resources
    • Free Trial – Private Threat Intelligence
    • White Paper: Building a Business Case for Cybersecurity Asset Management
    • White Paper: Cyber Deception – Migrating to an alternative platform
    • White Paper: Hunting for Threats in Operational Technology
    • White Paper: Internet Connected Storage
    • Whitepaper: 5 Steps to Building a Threat Modelling Program for AWS
    • Whitepaper: Coping with a flood of Data Subject Access Requests
  • Services
  • Support
  • Welcome

The Latest from Facebook

Glock Enterprises Ltd

3 hours ago

Glock Enterprises Ltd
This phishing scam left thousands of stolen passwords exposed through Google searchI'm sure we've all received a notification email telling us that there's a scan waiting. This particular email sent via compromised Wordpress sites (as is often the case) contains an extra surprise and might have led to your users' details being available to anyone with the necessary Google-foo skills...: Operators of a phishing campaign targeting the construction and energy sectors exposed credentials stolen in attacks that were publicly viewable with a simple Google search.On Thursday, Check Point Research published a blog post describing the campaign, in which stolen information was dumped on compromised WordPress domains.The recent phishing attack began with one of several fraudulent email templates and would mimic Xerox/Xeros scan notifications including a target company employee's name or title in the subject line.[...]Original article buff.ly/3c2pk59 ... See MoreSee Less

Photo

View on Facebook
· Share

Share on Facebook Share on Twitter Share on Linked In Share by Email

Proudly powered by WordPress | Theme: Moesia by aThemes