The Latest in IT Security

Posts Tagged ‘Exploit’

Through a collaboration with Eric Romang (@eromang), independent security researcher we can confirm that the watering hole campaigns are still ongoing and are targeting multiple targets, including as an example a major Hong Kong political party website.This website is actually using the new version of the original Internet Explorer (CVE-2012-4792) vulnerability attack, but right now […]

Read more ...

McAfee – A new Java zero-day vulnerability is spreading malicious files to infect unprotected users. The threat is dangerous: Just browsing a malicious page or clicking a malicious link in spam is enough to cause an infection when combined with a vulnerable Java version.Because most browsers enable Java by default, this vulnerability can be used […]

Read more ...

Microsoft is releasing an out of cycle security update for users of Internet Explorer 6-8.According to Microsoft: “While we have still seen only a limited number of customers affected by the issue, the potential exists that more customers could be affected in the future.”Potential indeed – there’s now evidence of this IE vulnerability being incorporated […]

Read more ...


Categories

THURSDAY, MARCH 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments