The Latest in IT Security

Posts Tagged ‘sore thumb’

As we have seen many times before (e.g. Mal/Iframe-Gen, Mal/Iframe-W), compromised sites are frequently injected with large, heavily obfuscated blocks of JavaScript. The primary goal of such scripts is to make it hard for scanners to detect the payload (typically an iframe or script load). However, the side effect of large, ugly, obfuscated scripts is […]

Read more ...

As a kid, I loved to lay on the grass at night and stare at the stars. Even though I knew of some constellations, I would try to find new patterns among the billions of stars. New connections. New meaning. As WebPulse hit one billion requests in one day, it reminded me of those days […]

Read more ...

A colleague of mine recently wrote about one of the June “Microsoft Tuesday” vulnerabilities being exploited in the wild. Because we're a bit like that, we decided to allow the exploit to compromise one of our honeypot computers so we could observe what happened. The exploit first came to our attention by way of email […]

Read more ...


Categories

THURSDAY, APRIL 25, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments