The Latest in IT Security

Posts Tagged ‘Computer security researchers’

Security researchers have uncovered a total of 22 vulnerabilities affecting the custom Java Virtual Machine (JVM) implementation used in Oracle Database.

Read more ...

Security researchers have found that a Citadel campaign that had evaded the Microsoft takedown in June 2013 is now using GameOver Trojan and is still claiming victims.The transition seems to have occurred before the disruption of the GameOver Zeus trojan, dubbed Operation Tovar, that involved a large number of security companies, researchers and law enforcement […]

Read more ...

Security researchers found that cybercriminals adopted new methods for distributing Havex, a remote access Trojan (RAT), and that their attention shifted towards industrial control systems (ICS). Havex has been previously used to compromise systems in the energetic sector, but this spring, it was observed that bad actors managed to implant trojanized versions of the software […]

Read more ...


Categories

TUESDAY, FEBRUARY 25, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments