An iframe exploit was embedded in a Veterans of Foreign War (VFW) web site, redirecting users to a “driveby malware” site. I’ll have a full report on this one up on the Patch Central blog over at GFI’s site within the next few days, explaining how it works, what it does, and who is suspected of being behind the attack.
About The Author
Deb Shinder
Debra Littlejohn Shinder is a technology and security analyst and author specializing in identity, security and cybercrime, utilizing her past experience as a police officer and police academy/criminal justice instructor. She has written numerous books and articles for web and print publications and has been awarded the Microsoft MVP designation for fourteen years in a row.
Read Next
GFI Software Announces Revolutionary AppManager™ Product to Unify Management of IT Solutions
Cloud-based platform consolidates software interfaces and customer accounts for managed service providers Ft. Lauderdale, FL (February 15, 2023) — GFI Software, the global leader in…
Static vs Dynamic IP Address
Most people are familiar with Internet Protocol (IP) Addresses, but many people don’t know you have 2 types. In this article, you’ll learn about static…
Types of Attack Vectors and How to Prevent Them
An attack vector is a cybersecurity term that describes a method used by a cybercriminal to gain access to your computer or network. These attack…
How to Break a String in YAML over Multiple Lines
YAML is a human-readable data serialization format. You can use it to store data for programs, and as an alternative to XML. YAML files are…