The Latest in IT Security

Posts Tagged ‘logs’

A few days ago, hundreds of websites, based on WordPress 3.2.1, were compromised. The attacker uploaded an HTML page to the standard Uploads folder and that page redirects the user to the Phoenix Exploit Kit. Its logs show that users from at least four hundred compromised sites were redirected to Phoenix exploit pages. Here is […]

Read more ...

08
Jan
2012

The big malware story for me over the last month is probably the surge in exploit kit sites hosting the “Blackhole” kit. (BTW, nice write-up last month on the kit on Imperva’s blog.) Bad Guys like exploit kits because they are a convenient way to leverage the work of multiple specialists — it’s nice to […]

Read more ...

This spam is obviously trying to do something evil, but I’m not quite sure what. Date:      Tue, 13 Dec 2011 15:23:00 -0600 From:      “Helen Oconnell” [terminationsm@migtel.ru] Subject:      11122011 PAYROLL INDICES http://jazzon.nl/YK4VUSWQ.html Please access the URL below to reveal PAYROLL LOGS. It was submitted to you using a Xerox WorkCentre. Pro ================================================================================================================== Confidential […]

Read more ...


Categories

MONDAY, APRIL 21, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments