The Latest in IT Security

Posts Tagged ‘attempts’

When Duqu, which most believed to be written by the same group that wrote Stuxnet, was originally uncovered, the infection vector was still unknown; how did the machines get compromised in the first place? That changed when the Hungarian research lab, CrySys, announced that it had found the dropper which was a Word file that […]

Read more ...

We have talked about the TimThumb WordPress plugin exploit before. If you haven’t read it yet, I recommend you read our previous post here: Vulnerability in TimThumb WordPress Plugins – The Effects.Today I found quite a few TimThumb related URLs when I was checking our Advanced Classification Engine detection feedback, so I ran one of them in the lab:  Obviously, the […]

Read more ...

Our description for Backdoor:OSX/Tsunami.A is now online. Tsunami is a Mac OS X backdoor with bot functionality. The bot is capable of participating in DDoS attacks, and in fact, one variant attempts to connect to an IRC server with “anonops” in its name — as in (Internet collective) Anonymous Ops. Because there is no obvious […]

Read more ...


Categories

TUESDAY, FEBRUARY 25, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments