The Latest in IT Security

Posts Tagged ‘compromise’

Thanks to Peter Coogan for his assistance with this research.Earlier this week Mandiant released a blog which talked about a new advanced persistent threat (APT) they found  while investigating a potential compromise. Symantec detects the APT in question as Backdoor.Hikit, a Trojan that enables an attacker to gain control of compromised servers from a remote […]

Read more ...

The last few months we have seen a drastic increase in Java-based malware abusing the CVE-2012-0507 AtomicReferenceArray type-confusion vulnerability. In addition to that, a few weeks ago, a new Java vulnerability was found (CVE-2012-1723); it is also a type-confusion vulnerability. The attack abusing this new vulnerability is also very active. Traditionally, Java has a strong […]

Read more ...


Categories

SATURDAY, APRIL 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments