The Latest in IT Security

Posts Tagged ‘defense contractors’

Download the PDF version of Operation Shady RAT report For the last few years, especially since the public revelation of Operation Aurora, the targeted successful intrusion into Google and two dozen other companies, I have often been asked by our worldwide customers if they should worry about such sophisticated penetrations themselves or if that is […]

Read more ...

18
Jul
2011

There’s a lot of talk about targeted attacks against defense contractors. These attacks are still continuing. We found this sample last week (md5: f393f34f268ddff34521d136e5555752). It’s a PDF file, apparently sent to an employee of the target company as an email attachment. When opened in Adobe Reader, it exploits a known Javascript vulnerability and drops a […]

Read more ...

On March 18, 2011, we blogged about a breach at RSA regarding the disclosure of unspecified sensitive materials related to SecurID. At the time, little information was made available as to the extent of the breach, the exact information that was compromised, or how it would affect RSA’s customers. In a related Threat Analysis, we […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments