The Latest in IT Security

Posts Tagged ‘logs’

Blue Coat – We’ve written a couple of times about “Facebook Fake Foto” attacks, and there’s a big one going on now…In Friday’s logs (6/23), there were almost a hundred URLs like this:  edosonicafotos.com/albums.php?status=twitter&c=txjdij&gallery=google+&e=TatianaSeveral components in the URLs are evocative of “Fake Foto” attacks: words like “fotos” and “albums” to look more believable popular site […]

Read more ...

We have been tracking timthumb.php related attacks for a while and they are still at full force (yes, some people are still using the outdated versions and getting compromised). Just for the month of May, we identified more than 400 domains hosting backdoors for those type of attacks and a botnet with more than 1,000 […]

Read more ...

I took another quick look yesterday to monitor how we're doing in identifying new sites and servers in the big Fake-AV attack that we blogged about twice in April. The analysts have been keeping an eye out for them, and Maria sent me some this week. Here is a closer look at two of them: […]

Read more ...


Categories

WEDNESDAY, JUNE 18, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments