The Latest in IT Security

Posts Tagged ‘Phoenix’

This fake Facebook spam leads to malware onDate:      Mon, 29 Jul 2013 09:33:38 -0600 [11:33:38 EDT]From:      Facebook [update+zj4o40c2_aay@facebookmail.com]Subject:      Betsy Wells wants to be friends with you on Facebook.    Interesting Pages on FacebookMark as favorite web pages that interest you to receive their updates in your News Feed.�Betsy WellsBetsy Wells    Baldric AguinoAstrid Aggas    […]

Read more ...

The Blackhole exploit kit has been extensively covered by Symantec for some time. As a brief reminder, like other exploit kits such as Phoenix, people using Blackhole compromise a legitimate site, inserting malicious and highly obfuscated JavaScript code into the site’s main page. To evade detection and avoid attracting suspicion, the rest of the page […]

Read more ...

In this post, we explore a telemetry spike in Java/OpenConnection and CVE-2011-3544 exploit activity. While reviewing user feedback from the Microsoft Malware Protection Center recently, we noticed an unprecedented amount of feedback on one particular Java/OpenConnection variant — TrojanDownloader:Java/OpenConnection.PK. Such interest in this type of Java applet-based exploit is quite unusual, and prompted us to investigate […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments