The Latest in IT Security

Posts Tagged ‘web attack’

An advanced cyber-espionage network targeting high-profile organizations and governments has recently been unveiled. The main attack method being used in this campaign is spear phishing.The spear phishing emails contain Word document or Excel spreadsheet attachments that exploit three known vulnerabilities in order to compromise computers. The vulnerabilities used are: Microsoft Excel ‘FEATHEADER’ Record Remote Code […]

Read more ...

Security Response recently blogged about the Java zero-day that is active in the wild and being distributed by the Cool Exploit Kit. In addition to Cool Exploit Kit, we are aware that several other major exploit kits such as Blackhole, Redkit, and Impact are also equipped to exploit this unpatched vulnerability.Symantec Security Response is currently […]

Read more ...

The use of zero-day exploits in attacks has not been too far from the headlines of late. Today, Kafeine from Malware don’t need Coffee has released a blog detailing yet another Java zero-day active in the wild and distributed through the Cool Exploit pack. The good news however-for Symantec customers who use our intrusion prevention […]

Read more ...


Categories

TUESDAY, MARCH 11, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments