Java

JackPOS malware presented as a Java Update SchedulerJackPOS malware presented as a Java Update Scheduler

JackPOS malware presented as a Java Update Scheduler

JackPOS was detected by security experts at IntelCrawler firm several days ago and it seemed based on code from "Alina".…

11 years ago
ENISA Threat Landscape 2013 report, the rise of cyber threatsENISA Threat Landscape 2013 report, the rise of cyber threats

ENISA Threat Landscape 2013 report, the rise of cyber threats

ENISA releases the ENISA Threat Landscape 2013, it a collection of information on top cyber-threats that have been assessed in…

11 years ago
F-Secure published Threat Report H1 2013 on security landscapeF-Secure published Threat Report H1 2013 on security landscape

F-Secure published Threat Report H1 2013 on security landscape

IT security firm F-Secure has published its Threat Report H1 2013, the document proposes a focus on Java exploits, mobile threats, Bitcoin mining,…

12 years ago
NetTraveler APT hackers still active improved their attacksNetTraveler APT hackers still active improved their attacks

NetTraveler APT hackers still active improved their attacks

Experts at Kaspersky firm provided evidences that the hackers behind cyber espionage campaign NetTraveler are still active and improved their attack…

12 years ago
Uncovered an unusual attacks based on anomalous file infectorUncovered an unusual attacks based on anomalous file infector

Uncovered an unusual attacks based on anomalous file infector

Security experts uncovered an unusual cyber espionage campaign based on file infector belonging to the PE_EXPIRO family that includes information theft…

12 years ago
Threat Intelligence Report by Solutionary, rise of cyber attacksThreat Intelligence Report by Solutionary, rise of cyber attacks

Threat Intelligence Report by Solutionary, rise of cyber attacks

Continues my overview of the main security reports published by leading companies that produce interesting analysis on the analysis of…

12 years ago
Java exploit signed with certificate stolen to Bit9Java exploit signed with certificate stolen to Bit9

Java exploit signed with certificate stolen to Bit9

According security experts the numerous cyber attacks that hit principal IT companies, news agencies and government offices exploited zero-day vulnerabilities…

12 years ago
New Zero-Day Vulnerabilities affect Java earlier versionsNew Zero-Day Vulnerabilities affect Java earlier versions

New Zero-Day Vulnerabilities affect Java earlier versions

Java, Java and once again Java, the popular framework and its vulnerabilities are becoming a really nightmare for security experts,…

12 years ago
Also Microsoft in the club of hacked companiesAlso Microsoft in the club of hacked companies

Also Microsoft in the club of hacked companies

When Apple revealed the hack to Reuters press agency I wrote that the last big enterprise not yet hacked was…

12 years ago
Facebook compromised by zero-day Java exploitFacebook compromised by zero-day Java exploit

Facebook compromised by zero-day Java exploit

In this last months we have registered numerous clamorous attacks against intelligence agencies, government offices, media and social networking platforms.…

12 years ago