The Latest in IT Security

Posts Tagged ‘URLs’

In the last few days we’ve seen this fake fax email doing the rounds, offering up a “2013 recruitment plan”: Click to Enlarge The email reads as follows: ********************************************************* INCOMING FAX REPORT ********************************************************* Date/Time: 09/28/2012 07:01:41 AM Speed: 14400 bps Connection time: 01:02 Pages: 2 Resolution: Normal Remote ID: 0420950504 Line number: 2 DTMF/DID: Description: […]

Read more ...

The Websense ThreatSeeker Network has detected that the website hxxp://goeast(dot)wagamama(dot)com, associated with Wagamama (a Japanese and sushi restaurant chain), has been compromised and injected with malicious code, also known as a RunForestRun attack. RunForestRun attack exploits vulnerability in Parallels Plesk to obtain user account credentials, then compromised accounts are used to modify JavaScript files.  As shown […]

Read more ...

Recently it was announced via posts in underground forums and Pastebin posts that a new version of the Blackhole Exploit Kit (BHEK), version 2.0, had been released. (The original announcement was in Russian; an English translation has been provided by researcher Denis Laskov and may be found here.) We cannot confirm that BHEK 2.0 has […]

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments