Vulnerabilities & Exploits
- July 14, 2014There is no silver bullet that can handle all targeted attacks that prey on organizations with varying security demands. In this article, we discuss the use of heuristics and sandboxing as complementary technologies that can go a long way against attacks.
- July 08, 201423 reported vulnerabilities affecting Internet Explorer versions 6 to 11 are now resolved thanks to the July 2014 patch. Microsoft issues a total of six security bulletins - patches for various products and Windows operating system components.
- July 01, 2014Isolated heap, a method where IE prepares an isolated heap for objects in IE that are prone to the use-after-free vulnerability. Isolated heap does a number of steps in occupying the memory space vacated by the object.
- June 21, 2014Signs operated by the North Carolina Department of Transportation were recently compromised by a hacker who changed them to read “Hacked by Sun Hacker Twitt Wth Me.”
- June 17, 2014A pattern emerges from the document exploits recently used by HORSMY, ESILE, FARFLI, and other targeted campaigns. Likely sourced in cybercriminal underground markets, this template exploit can be modified depending on what attackers need from their targets.
- May 23, 2014PLEAD, a new targeted attack campaign that was found targeting Taiwanese agencies just a week after similar targets were attacked using a Microsoft zero-day exploit. PLEAD uses phishing emails mixed with RTLO and Windows vulnerability techniques to ensnare vic