The Latest in IT Security

Posts Tagged ‘logs’

It's been a few months since I dipped into our Search Engine Poisoning (SEP) logs, so I've been taking a look… As I was poking around, one thing jumped out at me, which was not on my radar screen back when I did the big series on SEP: namely, attacks themed on topics often searched […]

Read more ...

This spam comes with a malware-laden attachment called INVOICE_28781731.zip:Date:      Fri, 29 Mar 2013 10:33:53 -0600 [12:33:53 EDT]From:      Victor_Lindsey@key.comSubject:      Please respond – overdue paymentPlease find attached your invoices for the past months. Remit the payment by 02/04/2013as outlines under our “Payment Terms” agreement.Thank you for your business,Sincerely,Victor LindseyThis e-mail has been sent from […]

Read more ...

While testing malware recently, we got some logs from our automated analysis system showing a few samples that are only partially replicated. We have heuristics that predict the behavior of a sample; but if that prediction fails, then the heuristics identify the state of a sample and decide if it is worth sending to our […]

Read more ...


Categories

TUESDAY, MARCH 11, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments