ArchiveOODA OriginalRisk Intel Report

Attack of Web 2.0

Recent reporting has indicated that malicious hackers are turning away from typical attack vectors like infected e-mail attachments. Instead, attackers are increasingly relying on ‘Drive-by download’ as a method of exploit delivery. According to research recently published by Google, approximately one in 10 websites contained ‘drive-by downloads.’ ‘Drive-by downloads’ are

Want more insight?

This content is restricted to members only. Members get access to all of the content on this site. This includes over 3000 Risk Intel Reports, the Attack Database (10,000 entries), over 3000 Intel Advisories, Threat Group Profiles on 500+ groups and over 100,000 curated OSINT excerpts. Your membership also supports the cost of producing our hand-curated Daily OSINT report.

Please consider becoming a member. For more information please click here. Thanks!
OODA Analyst

OODA Analyst

OODA is comprised of a unique team of international experts capable of providing advanced intelligence and analysis, strategy and planning support, risk and threat management, training, decision support, crisis response, and security services to global corporations and governments.