The Latest in IT Security

Posts Tagged ‘Attackers’

It has been reported in the media that several South Korean banks and local broadcasting organizations have been impacted by a cyber attack.The attack included the defacement of a Korean ISP/telecoms provider and also the crippling of servers belonging to a number of organizations.The defacement displays an elaborate animated Web page with sound effects, showing […]

Read more ...

Attackers use all kinds of attack vectors to steal sensitive information from their targets. Their efforts are not limited to only zero-day vulnerabilities. Malware authors often exploit old vulnerabilities because a large number of organizations still use old vulnerable software. The Trojan Travnet, which steals information, is a classic example of malware that takes advantage […]

Read more ...


Categories

WEDNESDAY, MARCH 19, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments