A combination of newer and older threat variations defined the cyber security landscape in the first quarter of 2015, according to the latest report from Trend Micro.
The Re-emerging threats challenge trust in supply chains and best practices report highlights malvertising, zero-day vulnerability exploitation, macro malware and the Freak vulnerability.
Researchers said exploit kits grew in sophistication and added new exploits to their arsenals, increasing their appeal to expert and novice attackers.
They also found that old threats are being reinvigorated with new targeted attack tools, tactics and procedures. For example, those behind Operation Pawn Storm set their sights on new targets, proving that targeted attacks are evolving.