article thumbnail

Targeted operation against Ukraine exploited 7-year-old MS Office bug

Security Affairs

It’s a PPSX file, seemingly an outdated US Army manual for tank mine clearing blades (MCB). The researchers pointed out that the use of the “script:” prefix demonstrates the exploitation of the vulnerability CVE-2017-8570 , a bypass for CVE-2017-0199. The remote script, named “widget_iframe.617766616773726468746672726a6834.html,”

article thumbnail

Cartographic’s Favorites of 2017

Unwritten Record

Additionally, a mine appears in the water near the Nashville, potentially posing a threat to the vessel. . The map of Le Bonhomme in France appears to be pretty average but it is the unique connection to a photograph within the holdings of the Still Pictures Branch which makes this map a favorite of 2017.

Mining 35
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

Rather than dropping ransomware on victims’ machines and hoping they would pay to regain access to their files, cyber criminals were increasingly cutting out the middle man and infecting victims’ machines with software that used their spare processing power to mine for cryptocurrency. In March, it transpired that a further 2.4

article thumbnail

Federal Agency Data is Under Siege

Thales Cloud Protection & Licensing

Originally Featured in Global Military Communications Magazine’s June/July Issue. Question: According to the report, in the past year, 57 percent of federal respondents experienced a data breach, compared with 34 percent in 2017 and 18 percent in 2016. What can you tell us about these breaches, and why are they becoming so prolific?

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

And, of course the military in particular is always concerned with that and, you know, good friends of mine like Billy rails for example who most people you're probably have heard of, spend a lot of their time in classified environments, trying to figure out how to fix those issues for the government.

IT 52
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

And, of course the military in particular is always concerned with that and, you know, good friends of mine like Billy rails for example who most people you're probably have heard of, spend a lot of their time in classified environments, trying to figure out how to fix those issues for the government.

IT 52
article thumbnail

Email Is the Biggest Threat to Business, So Why Is Everyone Using It?

Adam Levin

Email is the preferred tool hackers use to access their targets’ networks: 83% of organizations reported phishing attacks in 2018, up from 76% in 2017. Domain names were initially intended as a means of identifying remote academic, military, and government locations. “Just Because” Isn’t a Good Answer.

IT 45