The Latest in IT Security

Posts Tagged ‘fake document’

We recently came across an attack campaign which looked quite unusual compared to the standard attacks normally seen in the wild. This campaign is targeting government agencies by sending phishing emails with a malicious attachment. Nothing new so far, except for one thing: the malicious payload is a Java remote access tool (RAT).As we all […]

Read more ...

Adobe has recommended that its Flash customers update to the latest version, which addresses a vulnerability (CVE 2012-1535) in the ActiveX component of the Flash player. This flaw could cause the application to crash and potentially allow an attacker to take control of the affected system.Overview of the attack.We have also observed that the vulnerability […]

Read more ...

The faceless power of Anonymous rages on. Like headless horsemen, they gallop across the internet, intent on causing massive headaches and embarrassment for some, while keeping their fans and the media informed via social media. Sounds even too good for a Hollywood movie plot. You couldn’t make it up. But it turns out that someone […]

Read more ...


MONDAY, MAY 27, 2024

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments