The Latest in IT Security

Posts Tagged ‘oracle java’

As mentioned by me on Twitter, it seems that the entity or entities behind the watering hole attacks don’t care to be caught or detected, and it also seems that they don’t care if the Internet Explorer and Java vulnerabilities are patched. They act as opportunists and try to take advantage from the time frame […]

Read more ...

An advanced cyber-espionage network targeting high-profile organizations and governments has recently been unveiled. The main attack method being used in this campaign is spear phishing.The spear phishing emails contain Word document or Excel spreadsheet attachments that exploit three known vulnerabilities in order to compromise computers. The vulnerabilities used are: Microsoft Excel ‘FEATHEADER’ Record Remote Code […]

Read more ...

Through a collaboration with Eric Romang (@eromang), independent security researcher we can confirm that the watering hole campaigns are still ongoing and are targeting multiple targets, including as an example a major Hong Kong political party website.This website is actually using the new version of the original Internet Explorer (CVE-2012-4792) vulnerability attack, but right now […]

Read more ...


Categories

WEDNESDAY, MAY 08, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments