The Latest in IT Security

Posts Tagged ‘snapshot’

A few months back, I posted a blog on “co.tv” domains being used by attackers to host malicious code . We had identified number of different domains being used to carry out attacks using heavily obfuscated JavaScript. Now it appears that attackers are leveraging free “.ce.ms” domains. Likewise, we have identified a number of .ce.ms […]

Read more ...

27
Oct
2011

Last week, we announced our IPAbuseCheck lookup tool. We see lots of infected/abusive hosts on the Internet attempting to proxy abusive web transactions through our proxies. Rather than just ignoring these transactions, we’ve decided to provide this lookup utility for security professionals and organizations to query and identify abusive/infected hosts within their networks – based […]

Read more ...

Greetings Internet! This month (carefully hidden under the Win32/Bamital blanket), employing the old adage ‘fight fire with fire’, we decided to fight sneakiness with sneakiness and quietly slipped a fairly major Win32/Zbot update into MSRT. “Zbot” I hear you say? Yes, it’s still around and kicking. Despite Win32/Zbot (officially self-titled with the oh-so-ego-inflating ‘Zeus’ moniker, despite […]

Read more ...


Categories

SATURDAY, APRIL 19, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments