Recently we've been able to observe several shifts in exploit kit techniques, so I thought it would be good to share the IOC information for the exploit kits so that administrators and network defenders can take a look at their devices and logs to remediate on their networks.
read more.......http://vrt-blog.snort.org/2014/06/the-never-ending-exploit-kit-shift.html