The Latest in IT Security

Posts Tagged ‘logs’

Unlike humans, who usually need a nap after a big Thanksgiving Day feast, our automated modules keep working away. Either that, or malware has zero calories so WebPulse stays hungry… 😉 As I tweeted (@bc_malware_guy) on Saturday, our logs show another “Fake Foto” attack targeting Facebook users, beginning late Friday night (22:43:54 UTC in our […]

Read more ...

A couple of months ago, we showed off a sample of our next-generation malware delivery network (“malnet”) graphs. Since then, we’ve pressed the wizard behind them (Jon) to come up with a way to animate the graphs, so that we could show them in a time-lapse video. Here’s what he’s come up with so far. […]

Read more ...

Yesterday, WebPulse blocked over 100 attempts by our users to download a malicious executable. It’s an attack type I don’t remember specifically writing about in the past, so it’s worth a quick post. The sample I grabbed was named USPS_Invoice_10242011.PDF.exe. From the file name, I rather suspected that I would find that this was another […]

Read more ...


Categories

MONDAY, APRIL 21, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments