The Latest in IT Security

Posts Tagged ‘Mail’

During the course of investigating an open incident ticket with a customer, we uncovered what is a common occurrence on the web – legitimate sites linking in third-party content (often advertisements or banners) that ultimately drives the victim browser to an exploit kit.Here is the chain of events that we observed: User browsed to: www.thenewsvault.com […]

Read more ...

I came across Komplit Plyus LLC / AS56697 (91.226.78.0/24) while having a look at this injection attack. At first glance it looked like everything in this /24 was dodgy. After taking a close look, I cannot find a single legitimate site in this range and would strongly recommend that you block it. A full list […]

Read more ...

Another recycled spam campaign leading to malware: Date:      Tue, 13 Mar 2012 01:52:30 +0700 From:      “Greyson Montoya” Subject:      I’m in trouble! Attachments:     Image_DIG33080106.htm I was at a party yesterday, got drunk, couldn’t drive the car, somebody gave me a lift on my car, and crossed on the red light! I’ve just […]

Read more ...


Categories

WEDNESDAY, JUNE 18, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments