Product
Game Protection
Anti-Cheat & Anti-Hack
Online Protection
Solutions
FPS Game Solution
SLG Game Solution
Casual Game Solution
MMO Game Solution
Card Game Solution
Help Center
Android
User Manual
Tool Download
FAQ
iOS
User Manual
Tool Download
FAQ
Windows
User Manual
Tool Download
FAQ
Blog
Price
Android
iOS
Windows
Company
About us
Why JikGuard
Contact us
Free Trial
News
Malicious Microsoft Office Documents Move Beyond InkPicture
In late August we began to detect malicious Microsoft Word documents that contained VisualBasic (VB) macro code and the code appeared to be triggering
Oct. 19, 2016
The Shadow Brokers EPICBANANA and EXTRABACON Exploits
UPDATE April 20, 2017 Cisco continues to evaluate potential implications of the activities and information posted publicly by the Shadow Brokers Group.
Aug. 17, 2016
Mitigations Available for the DRAM Row Hammer Vulnerability
This blog post was authored by Troy Fridley and Omar Santos of Cisco PSIRT. On Mar 9 2015, the Project Zero team at Google revealed findings from new
March 9, 2015
Ancient Mac Site Harbors Botnet that Exploits IE Vulnerability
This post was authored by Alex Chiu and Shaun Hurley. Last month, Microsoft released a security bulletin to patch CVE-2014-6332, a vulnerability within
Dec. 15, 2014
RIG Exploit Kit Strikes Oil
This post was co-authored by Levi Gundert with contributions from Emmanuel Tacheau and Joel Esler. In the last month we have observed high levels of
June 5, 2014
Angling for Silverlight Exploits
This post is co-authored by Andrew Tsonchev, Jaeson Schultz, Alex Chiu, Seth Hanford, Craig Williams, Steven Poulson, and Joel Esler. Special thanks to
May 19, 2014
Year-Long Exploit Pack Traffic Campaign Surges After Leveraging CDN
Anyone can purchase an exploit pack (EP) license or rent time on an existing EP server. The challenge for threat actors is to redirect unsuspecting web browsing victims by force to the exploit landing page with sustained frequency. Naturally, like most criminal services in the underground, the dark art of traffic generation is a niche specialty that must be purchased to ensure drive-by campaign success. For the past year we have been tracking a threat actor (group) that compromises legitimate websites and redirects victims to EP landing pages. Over the past three months we observed the same actor using malvertising …
April 15, 2014
Fiesta Exploit Pack is No Party for Drive-By Victims
This post was also authored by Andrew Tsonchev and Steven Poulson. Update 2014-05-26: Thank you to Fox-IT for providing the Fiesta logo image. We updated
Jan. 23, 2014
Watering-Hole Attacks Target Energy Sector
Beginning in early May, Cisco TRAC has observed a number of malicious redirects that appear to be part of a watering-hole style attack targeting the
Sept. 18, 2013