The Latest in IT Security

Posts Tagged ‘Exploit’

The email The structure of the displayed URL is always the same:http ://IP-address/news.html or http ://IP-address/boston.html The subject lines vary but are always related directly to Boston. Here are some examples in alphabetical order: 2 Explosions at Boston Marathon Aftermath to explosion at Boston Marathon Boston Explosion Caught on Video BREAKING – Boston Marathon Explosion […]

Read more ...

A new-ish Flash exploit is still on the loose for attack around the web. This time, the attackers have compromised a caregiver site providing support for Tibetan refugee children and are spreading backdoors signed with Winnti stolen certificates delivered with Flash exploits – the compromised web site is the NGO “Tibetan Homes Foundation”. Previously, FireEye […]

Read more ...

A new-ish Flash exploit has been on the loose for attacks around the web. This time, the attackers have compromised a caregiver site providing support for Tibetan refugee children and are spreading backdoors signed with Winnti stolen certificates delivered with Flash exploits – the compromised web site is the NGO “Tibetan Homes Foundation”. Previously, FireEye […]

Read more ...


Categories

TUESDAY, MARCH 18, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments