The Latest in IT Security

Posts Tagged ‘checks’

The shellcode described in this post was obtained from the Eleonore v1.2 exploit kit. High-level details about that kit are mentioned in my April 2012 blog post. This post is a technical view of the actual shellcode and is intended to be instructive to the inquisitive reader. Since this code is relatively old, the main […]

Read more ...

Classmates.com has become the latest in a series of well-known brands to be abused by a particular gang of malware distributors. The similarities to other outbreaks include: Linking to multiple compromised sites which then redirect to the malware hosting sites Favoring WordPress sites (that can be exploited) Hosting the malware on various .ru domains Showing […]

Read more ...

Recently, we’ve seen an Amazon spam in the wild that looks like this: click to enlarge The sender’s name was deliberately called “Amazon.com” to make the spam appear legitimate. What gives away this particular spam, however, is that this sends to multiple recipients even if the email is meant for an individual. All links in […]

Read more ...


Categories

SUNDAY, APRIL 06, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments