The hundreds of ctargeted in a large-scale cyberespionage operation dubbed Red October were not only attacked using malicious Excel and Word documents as previously believed, but also by using Web-based Java exploits, according to ...
Tags: cyberespionage, Red October Cyberespionage Attacks, cyber security