Quantcast
Channel: Naked Security - Sophos
Viewing all articles
Browse latest Browse all 9780

A closer look at the malicious Redkit exploit kit

$
0
0
In the second technical article of this series, Fraser Howard investigates deeper into the workings of Redkit exploit kit. Learn more about the internals of this kit; bypassing of security mechanisms within Java, the use of file encryption, and delivery of multiple payloads.

Viewing all articles
Browse latest Browse all 9780

Trending Articles