Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures.Read more
Watering hole attacks infect popular webpages with malware to impact many users at a time. It requires careful planning on the attacker’s part to find weaknesses in specific sites. They look for existing vulnerabilities that are not known and patched — such weaknesses are deemed zero-day exploits.
was still through watering hole attacks and the use of exploit kits. These days, it has become mostly via email and SMS messages, followed by secondary downloads from compromised websites." Mounir Hahad - Head of Juniper Threat Labs at Juniper NetworksRead more