The Latest in IT Security

Posts Tagged ‘Attackers’

Fake Flash updates are leveraged as a very popular trick amongst attackers to fool users into downloading and installing malware. This week we found a three websites distributing Win32.Sanity.N malware disguised as Flash updates: hxxp://kivancoldu.com/, redirects to hxxp://click-videox.com/ http://kivancoldu.com on 05/02/2013 hxxp://fastcekim.com/, redirects to hxxp://click-videox.com/ hxxp://kivanctatlitug.tk/ d(down) hxxp://kivanctatlitug.tk/ The fake warning at the top of […]

Read more ...

As if on queue, almost 7 days since we released the post about the latest W3TC and WP Super Cache remote command execution vulnerability, we have started to see attacks spring up across our network. In our post you might remember this:<!-mfunc echo PHP_VERSION; -><!-/mfunc->In this example we explained how it was a very simple […]

Read more ...

This blog describes briefly what WebShells are, and how attackers can use WebShells to gain powerful shell level/system level access to a server. WebShells have been used in attacks for quite a long time now, but with changes in attack trends, cyber criminals are getting more sophisticated with deployment techniques and methods to circumvent detection. With the help […]

Read more ...


Categories

MONDAY, MARCH 17, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments