For our May issue's "threat of the month," we focused on pdf.exe.zip files, an old-style email executable attachment attack.
April's "threat of the month" are Universal Plug and Play (UPnP) vulnerabilities, which allow attackers to execute arbitrary code.
Java zero-days are the "threat of the month," a vulnerability that allows remote code execution via browsers.
IE exploits, a zero-day vulnerability that affects various Internet Explorer versions, are February's "Threat of the month."
Our threat of the month for December are natural disasters, which result in the loss of confidentiality, integrity, and availability of sensitive information.
The "Threat of the Month" in our November issue are IE exploits.
This month's threat of the month is anti-virtualization malware which automatically activates on a system boot-up.
Unauthorized information disclosure via "paste" sites has been a common occurrence as a part of recent high-profile information security breaches.
Flame, aka Skywiper, is a sophisticated tool used to locate and steal data accessible from the infected computer. The malware uses multiple exploits to propagate and is highly configurable.
Also know as mass malware packs, crimeware packs are the "Threat of the Month" in the June issue of SC Magazine.
Threat of the month: Chrome exploit
One of the most talked about threats this month is the infamous Ukash ransomware.
Threat of the month: Compromised embedded systems
Threat of the month: Unpatched applications
Threat of the month: Adobe vulnerabilities
Morto recently rose to fame as the first worm to leverage the Microsoft RDP protocol to propagate.
Perimeter exploit exposure
Sun/Oracle Java SE
Be on the lookout for new mobile malware that leverages trojan, bot and "logic bomb" tricks.
The Sony PlayStation Network/Qriocity service breach of 77 million records contained a twist that makes it dangerous.
Threat of the month: Flash zero-day
P2P DNS is the latest proposal for an alternative Domain Name System (DNS) service, one that strives to replace ICANN as the authority.
A new Firefox add-on can cause serious repercussions for users surfing the web on public Wi-Fi.
Advanced malware threats
MS Windows Help Center
This threat refers to a plethora of password-stealing trojans targeting gamers.
Clampi (aka Ligats or Ilomo) is an information theft botnet. The malcode is a multicomponent tool that injects code into running processes, alters the PC's configuration and, once established, begins to harvest and send sensitive information from the PC to its handlers.
Conficker, which is both a worm and a bot, is one of the more sophisticated pieces of malicious software (malware) we have seen to date.