Red October Hackers Exploited Known Java Vulnerability
Author: Shafeeque Olassery Kunnikkal | Category: Cyber Security, Featured, Information Security, Vulnerability Assessment | Leave a Comment

Among the attack vectors employed by those behind the Red October cyberespionage campaign was an old Java exploit. Red October, which appears to have been operational for at least five years, targeted diplomatic, military, and government data on computer systems and mobile devices. Kaspersky Labs disclosed their discovery of Red October on Monday, January 14……
Continue Reading