The Latest in IT Security

Posts Tagged ‘cve’

 In our recent blogs about the latest Internet Explorer zero-day vulnerability, we explained what watering hole attacks are and referenced our research paper about the Elderwood Project. The paper highlights a string of watering hole attacks by the Elderwood group. After revisiting those previous attacks, we have been able to confirm that this latest Internet […]

Read more ...

In the past few months, we encountered two serious Java vulnerabilities; one is CVE-2012-4681, the other is CVE-2012-5076. Both of them have some common characteristics, the first being that both of them are Java applet programs. The second is that they use a Java reflection mechanism to break Java applet security restrictions and load malicious […]

Read more ...

Acting on a tip, a member of our Threat Research team (Brod) has discovered a Dalai Lama related website is compromised and is pushing new Mac malware, called Dockster, using a Java-based exploit.Page source from gyalwarinpoche.com:Here’s a screenshot of gyalwarinpoche.com from Google’s cache:Note: Google’s November 27th snapshot also includes a link to the malicious exploit […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments