The Latest in IT Security

Posts Tagged ‘ip addresses’

The Flame malware uses several methods to replicate itself. The most interesting one is the use of the Microsoft Windows Update service. This is implemented in Flame’s “SNACK”, “MUNCH” and “GADGET” modules. Being parts of Flame, these modules are easily reconfigurable. The behavior of these modules is controlled by Flame’s global registry, the database that […]

Read more ...

This fake HP OfficeJet spam leads to malware on uzindexation.ru: From: Ashley Madison [mailto:donotreply@ashleymadison.com] Sent: 05 June 2012 04:12 Subject: Scan from a HP ScanJet #593159 Attached document was scanned and sent to you using a Hewlett-Packard HP Officejet 6821P. Sent by: Daxton Images : 3 Attachment Type: .HTM [INTERNET EXPLORER] Hewlett-Packard Officejet Location: machine […]

Read more ...

We have been tracking timthumb.php related attacks for a while and they are still at full force (yes, some people are still using the outdated versions and getting compromised). Just for the month of May, we identified more than 400 domains hosting backdoors for those type of attacks and a botnet with more than 1,000 […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments