Blackhole Author Arrested: 10 Facts About The Automated Attack Toolkit

Defending The Network From Blackhole: Exploit Kit Prevention

Security experts advocate a variety of technologies that provide protection from automated attack toolkits. Intrusion prevention systems detect and block ongoing attacks. Proactive network monitoring and threat intelligence feeds can be fed into systems to apply protections against the latest threats and block potentially malicious IP addresses associated with them. End users should be using up-to-date endpoint security software. Web content filtering can be applied to detect botnet activity by detecting malicious traffic.

Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.