ArchiveOODA OriginalRisk Intel Report

Attack of Web 2.0

Recent reporting has indicated that malicious hackers are turning away from typical attack vectors like infected e-mail attachments. Instead, attackers are increasingly relying on ‘Drive-by download’ as a method of exploit delivery. According to research recently published by Google, approximately one in 10 websites contained ‘drive-by downloads.’ ‘Drive-by downloads’ are

Want more insight?

This content is restricted to members only. Members get access to all site content plus access to exclusive reports and events and the OODA Expert Network. Please consider becoming a member. For more information please click here. Thanks!
OODA Analyst

OODA Analyst

OODA is comprised of a unique team of international experts capable of providing advanced intelligence and analysis, strategy and planning support, risk and threat management, training, decision support, crisis response, and security services to global corporations and governments.