IT security firm F-Secure has published its Threat Report H1 2013, the document proposes a focus on Java exploits, mobile threats, Bitcoin mining, APTs and Mac malware. The majority of exploit-based attacks are conducted using exploit kits, with 70% attributed to these five: Blackhole, SweetOrange, Crimeboss, Styx and Cool. Phishing attacks are improved by the use of construction kits now available that simplify the production of phishing sites, according to the report.”]
Source: https://securityaffairs.co/wordpress/18206/cyber-crime/f-secure-threat-report-h1-2013.html

