Skip to content

INFOGRAPHIC: Stop threats dead in their tracks

Attackers have been using the infamous Blackhole Exploit Kit to take advantage of existing vulnerabilities in users' systems with the end goal of compromising their security and stealing data/money in the Blackhole Exploit Kit spam campaign. With the aid of user feedback, the Trend Micro™ Smart Protection Network™ automatically identifies key attack components and uniquely malicious behavior sequences. Using automated correlation backed by the power of the Smart Protection Network, we were able to pinpoint potentially malicious behaviors, preventing the various attack components—spam, malicious URLs, exploits, and malware—from even reaching users' systems.

To embed this infographic please copy the code below to your website:

Social Media

Connect with us on