A closer look at the Angler exploit kit – Sophos News
![](https://news.sophos.com/wp-content/uploads/2016/01/ransomeware-exploit-kit.jpg?w=640)
![](https://duo.com/assets/img/blog/outdated-browser-plugin.png)
Flash Vulnerabilities & Exploits: An Information Security Primer
![](https://talosintelligence.com/assets/AnglerNoSubsFinal-f5864491a740d5aaddc6b39add8e32db4d9ce325b430aa50f9391b3a16fdec62.png)
Cisco Talos Intelligence Group - Comprehensive Threat Intelligence
![](https://image.slidesharecdn.com/sophos-qed2016-160612185325/85/sophos-presentation-used-during-the-switchpoint-nvsa-quarterly-experience-day-on-7th-june-2016-20-320.jpg)
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly
![](https://www.forcepoint.com/sites/default/files/blog/legacy/security-labs/7103.examplecipher.png-550x0.png)
Angler Exploit Kit - Operating at the Cutting Edge
![](https://www.proofpoint.com/sites/default/files/styles/metatag/public/images/Blog/your-ad-here.jpg.webp?itok=w7A05aDF)
The shadow knows: Malvertising campaigns use domain shadowing to
![](https://news.sophos.com/wp-content/uploads/2015/07/fig-1-angler-ek-growth.png)
A closer look at the Angler exploit kit – Sophos News
![](https://regmedia.co.uk/2015/07/23/angler_45654764564.jpg)
Flash zero-day monster Angler dominates exploit kit crime market
![](https://duo.com/assets/img/blog/outdated-flash-java-dashboard-20160112142522.png)
Flash Vulnerabilities & Exploits: An Information Security Primer
![](https://news.sophos.com/wp-content/uploads/2015/07/fig-19-logic-shellcode.png)
A closer look at the Angler exploit kit – Sophos News
![](https://news.sophos.com/wp-content/uploads/2015/07/fig-21-domain-shadowing1.png)
A closer look at the Angler exploit kit – Sophos News
Untitled, PDF, Cybercrime
![](https://news.sophos.com/wp-content/uploads/2015/07/fig-22-domain-shadowing-single-level.png)
A closer look at the Angler exploit kit – Sophos News
![](https://www.forcepoint.com/sites/default/files/blog/legacy/security-labs/0535.transpositioncipher.png-550x0.png)
Angler Exploit Kit - Operating at the Cutting Edge