Monthly Archives: January 2012

Google announces new anti-malware features in Chrome

January 9, 2012By Blog Staff

by Dancho Danchev Google Inc. recently announced a new security feature in its Chrome browser. The feature will alert Chrome users every time they’re about to download a potentially malicious executable file. More…read more

A peek inside the Cythosia v2 DDoS Bot

January 9, 2012By Blog Staff

by Dancho Danchev With DDoS extortion and DDoS for hire attacks proliferating, next to the ever decreasing price for renting a botnet, it shouldn’t come as a surprise that cybercriminals are constantly experimenting…read more

A peek inside the PickPocket Botnet

January 6, 2012By Blog Staff

by Dancho Danchev Malicious attackers quickly adapt to emerging trends, and therefore constantly produce new malicious releases. One of these recently released underground tools, is the PickPocket Botnet, a web-based command and control…read more

Mass SQL injection attack affects over 200,000 URLs

January 5, 2012By Blog Staff

by Dancho Danchev Security researchers from the Internet Storm Center, have intercepted a currently ongoing SQL injection attack, that has already affected over 200,000 URLs. The attack was originally detected in early December, 2011….read more

Welcome to the team, Dancho!

January 5, 2012By Blog Staff

Notice someone new on the Webroot Threat Blog? We’re thrilled to introduce Dancho Danchev – independent security consultant, cyber threat analyst and bad-guy chaser extraordinaire – as our new security blogger. Many of…read more

Email hacking for hire going mainstream

January 5, 2012By Blog Staff

by Dancho Danchev Just how easy is it to hack someone’s email nowadays? Very easy as the process is offered as a managed service within the cybercrime ecosystem. Over the past couple of…read more

Millions of harvested emails offered for sale

January 3, 2012By Blog Staff

What does it take to be a successful spammer in 2012? Access to a botnet, managed spamming appliance, spam templates that are capable of bypassing spam filters, and most importantly freshly harvested databases…read more