The Latest in IT Security

Posts Tagged ‘geographic distribution’

Security Response recently blogged about the Java zero-day that is active in the wild and being distributed by the Cool Exploit Kit. In addition to Cool Exploit Kit, we are aware that several other major exploit kits such as Blackhole, Redkit, and Impact are also equipped to exploit this unpatched vulnerability.Symantec Security Response is currently […]

Read more ...

Symantec has recently encountered a threat named Trojan.Stabuniq. This Trojan was found on several servers belonging to financial institutions, including banking firms and credit unions. The Trojan has also compromised home computer users, as well as computers at security firms: Figure 1. Trojan.Stabuniq distribution by type Approximately half of unique IP addresses found with Trojan.Stabuniq belong to […]

Read more ...

After intercepting one of the domain names used by the Flashback/Flashfake Mac Trojan and setting up a special sinkhole server last Friday, we managed to gather stats on the scale and geographic distribution of the related botnet. We published information on this in our previous blog entry. We continued to intercept domain names after setting […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments