The Latest in IT Security

Posts Tagged ‘snapshot’

The Websense® ThreatSeeker® Network has detected that a DNS poisoning attack is happening in Kenya, with local big name websites in information technology targeted including Google, Bing, and LinkedIn. Although DNS records point to a page on behalf of the attackers that lets the browsing user know about the hack, it could easily be replaced with a malicious page at will. Below […]

Read more ...

During the first half of the year, we have seen targeted attacks leveraging the Syrian conflict and how the backdoor RAT DarkComet was used, which we documented in the following blog posts: DarkComet Surfaced in the Targeted Attacks in Syrian Conflict Fake Skype Encryption Software Cloaks DarkComet Trojan After the report that the Anonymous collective […]

Read more ...

Acting on a tip, a member of our Threat Research team (Brod) has discovered a Dalai Lama related website is compromised and is pushing new Mac malware, called Dockster, using a Java-based exploit.Page source from gyalwarinpoche.com:Here’s a screenshot of gyalwarinpoche.com from Google’s cache:Note: Google’s November 27th snapshot also includes a link to the malicious exploit […]

Read more ...


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments