The Latest in IT Security

Posts Tagged ‘logs’

Yesterday I was looking through the mid-day logs from one of the WebPulse modules, checking out the malware it had flagged. One of these caught my eye: a single log line referring to a setup.exe file coming from a site called youtube-vid.com. The thought occurred to me that we typically only take time to research […]

Read more ...

There’s something evil on 194.219.29.139 [Forthnet SA, Athens], in this case it appears to related to the SpyEye trojan. In particular, a lot of traffic seems to be going to ce.ms sites, searching your logs for references to ce.ms/main.php might prove fruitful. All these following sites are malicious: 2fdf2asolhost.cx.cc 3lshegijlsjelsf.ce.ms 3rdkjhgtuhryt67.ce.ms 75pe.be.ma aficaekooy.qpoe.com anupadwxst.x24hr.com arumakhbyu.ygto.com […]

Read more ...

The big story yesterday (9/26/2011) was mysql.com getting hacked, and serving up malicious JavaScript in its pages. The JavaScript created an invisible iFrame that linked to a drive-by-download attack hosted on malicious servers — an attack with a poorly detected payload. In related news, there were also reports that “root” access to mysql.com had been […]

Read more ...


Categories

MONDAY, APRIL 21, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments