The Latest in IT Security

Posts Tagged ‘logs’

One of the things we try to keep an eye out for is a new malware binary that is poorly detected by other methods, since it helps us show that there is real value in the non-traditional detection techniques used in WebPulse. A couple of weeks ago, we rolled out an important update to one […]

Read more ...

[A lot of travel recently has pre-empted work on the blog. Here is a cool post from Tim in our internal team blog a couple of weeks ago. I’ve been pestering him to do another in our "visualizing malware" series… –C.L.] As we have seen before (More Malicious Ads, Visualizing Malware Networks), malvertising enables the […]

Read more ...

This past Tuesday, June 14, a vulnerability (CVE-2011-2110) in the Adobe Flash Player was patched. This vulnerability is actively being exploited in the wild – prior to the patch, the earliest exploitation that we have seen in our logs thus far, dates back to early last Thursday (June 9th). Attackers have/are embedding redirects into compromised […]

Read more ...


Categories

TUESDAY, APRIL 22, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments