Java exploit used in Red October cyberespionage attacks, researchers say
The hundreds of government, military and research organizations targeted in a large-scale cyberespionage operation dubbed Red October were not only attacked using malicious Excel and Word documents as previously believed, but also by using Web-based Java exploits, according to researchers from Israeli IT security firm Seculert.
Read more: Java exploit used in Red October cyberespionage attacks, researchers say
Story added 15. January 2013, content source with full text you can find at link above.