Malware exploiting Spectre and Meltdown flaws are currently based on available PoC Malware Exploiting Spectre, Meltdown Flaws Emerges Resea...
Mozilla fixes a critical remote code execution vulnerability in Firefox
Mozilla fixes a critical remote code execution vulnerability in Firefox Mozilla has released security updates for Firefox 58 that addresses...
US Attorney General set up the Joint Criminal Opioid Darknet Enforcement team to fight online opioid...
US Attorney General set up the Joint Criminal Opioid Darknet Enforcement team to fight online opioid... The US Attorney General announced t...
Is ICEMAN behind the malware-based attack on Crystal Finance Millennium?
Is ICEMAN behind the malware-based attack on Crystal Finance Millennium? Exclusive – The Iceman gang taking responsibility for infecting Cr...
Is ICEMAN behind the malware-based attack on Crystal Finance Millennium?
Is ICEMAN behind the malware-based attack on Crystal Finance Millennium? Exclusive – The Iceman gang taking responsibility for infecting Cr...
More than 1,700 valid Telnet credentials for IoT devices leaked online
More than 1,700 valid Telnet credentials for IoT devices leaked online Security researchers are warning of the availability online of a lis...
Watcho ut! Adware spreading via Facebook Messenger
Watcho ut! Adware spreading via Facebook Messenger Security experts from Kaspersky Lab have spotted an ongoing cross-platform malware campa...
ShadowPad backdoor was spread in corporate networks through software update mechanism
ShadowPad backdoor was spread in corporate networks through software update mechanism Kaspersky Lab discovered attackers were able to modif...
Cybercriminals Stealing From Cybercriminals Ransomware Victims Left Stranded
Cybercriminals Stealing From Cybercriminals Ransomware Victims Left Stranded What do you get when you add Bitcoin, with a TOR network proxy...
Cybercriminals Stealing From Cybercriminals Ransomware Victims Left Stranded
Cybercriminals Stealing From Cybercriminals Ransomware Victims Left Stranded What do you get when you add Bitcoin, with a TOR network proxy...
Once again, Oracle MICROS PoS have been breached
Once again, Oracle MICROS PoS have been breached Security experts from ERPScan discovered a new flaw in Oracle MICROS PoS terminals that co...
Three Dutch banks and Tax Agency under DDoS Attacks … is it a Russian job?
Three Dutch banks and Tax Agency under DDoS Attacks … is it a Russian job? Three Dutch Banks (ABN AMRO, ING Bank, Rabobank) and Tax Agency ...
Cisco ASA software is affected by a flaw with 10 out of 10 severity rating. Patch it asap
Cisco ASA software is affected by a flaw with 10 out of 10 severity rating. Patch it asap Cisco released security updates to address a crit...
Crooks target ATMs with Ploutus-D malware, these are the first confirmed cases of Jackpotting in US
Crooks target ATMs with Ploutus-D malware, these are the first confirmed cases of Jackpotting in US Cybercriminals are targeting ATM machin...
Intel reportedly alerted Chinese companies before US Government about Meltdown and Spectre flaws
Intel reportedly alerted Chinese companies before US Government about Meltdown and Spectre flaws According to the Wall Stree Journal, Intel...
#ThinkBeyond – Security solutions from market leaders may all fail in your particular environment
#ThinkBeyond – Security solutions from market leaders may all fail in your particular environment Buying solutions proposed by analyst firm...
Dridex banking Trojan and the FriedEx ransomware were developed by the same group
Dridex banking Trojan and the FriedEx ransomware were developed by the same group Security researchers from ESET have tied another family o...
Military personnel improperly used Fitness Strava Tracker exposed their bases
Military personnel improperly used Fitness Strava Tracker exposed their bases Military worldwide have publicly shared online their exercise...
Faulty firmware OTA update bricked hundreds of LockState smart locks
Faulty firmware OTA update bricked hundreds of LockState smart locks Some models of LockState smart locks also used by AirBnB customers wer...
Use Rsync for Daily, Weekly and Full Monthly Backups (Automated SSH Login For Remote Backups) Scripts
Use Rsync for Daily, Weekly and Full Monthly Backups (Automated SSH Login For Remote Backups) Scripts Bunch of references using rsync in di...
8 Signs Someone Is Too Stressed (And Doesn’t Know It)
8 Signs Someone Is Too Stressed (And Doesn’t Know It) Stress can affect all aspects of your life, including your emotions, behaviors, think...
Over the weekend Microsoft rolled out out-of-band updates to disable mitigations for Spectre v2 attacks
Over the weekend Microsoft rolled out out-of-band updates to disable mitigations for Spectre v2 attacks Over the weekend, Microsoft rolled ...
Over the weekend Microsoft rolled out out-of-band updates to disable mitigations for Spectre v2 attacks
Over the weekend Microsoft rolled out out-of-band updates to disable mitigations for Spectre v2 attacks Over the weekend, Microsoft rolled ...
A new report from MALWAREBYTES reveals a rise of 90% on ransomware detection in business
A new report from MALWAREBYTES reveals a rise of 90% on ransomware detection in business A new report from MALWAREBYTES titled “Malwarebyte...
On Saturday Malwarebytes delivered a buggy update that caused excessive memory usage and crashes.
On Saturday Malwarebytes delivered a buggy update that caused excessive memory usage and crashes. On Saturday Malwarebytes issued a buggy u...
Cybersecurity week Round-Up (2018, Week 4)
Cybersecurity week Round-Up (2018, Week 4) Cybersecurity week Round-Up (2018, Week 4) -Let’s try to summarize the most important event occu...
Japan-based digital exchange Coincheck to refund to customers after cyberheist
Japan-based digital exchange Coincheck to refund to customers after cyberheist Coincheck announced it will refund about $400 million to 260...
Iran-linked APT OilRig target IIS Web Servers with new RGDoor Backdoor
Iran-linked APT OilRig target IIS Web Servers with new RGDoor Backdoor The Iran-linked cyber-espionage group tracked as OilRig started usin...
Attackers behind Cloudflare_solutions Keylogger are back, 2000 WordPress sites already infected
Attackers behind Cloudflare_solutions Keylogger are back, 2000 WordPress sites already infected More than 2,000 WordPress sites have been i...
Security Affairs newsletter Round 147 – News of the week
Security Affairs newsletter Round 147 – News of the week A new round of the weekly SecurityAffairs newsletter arrived! The best news of the...
Download URLs for two packages of the phpBB forum software were compromised
Download URLs for two packages of the phpBB forum software were compromised Hacker compromised the download URLs of the popular phpBB forum...
Cybercriminals are offering for sale infant fullz on the dark web
Cybercriminals are offering for sale infant fullz on the dark web Cybercriminals are offering for sale infant fullz on the dark web, this i...
Cybercriminals are offering for sale infant fullz on the dark web
Cybercriminals are offering for sale infant fullz on the dark web Cybercriminals are offering for sale infant fullz on the dark web, this i...
Cisco IOS vulnerabilities open Rockwell Industrial Switches to attacks
Cisco IOS vulnerabilities open Rockwell Industrial Switches to attacks Vulnerabilities in Cisco IOS expose Rockwell Allen-Bradley Stratix a...
Mobile Trojan Development Kits allow creating ransomware without the need to write code
Mobile Trojan Development Kits allow creating ransomware without the need to write code Researchers at Symantec have discovered Trojan Deve...
Zerodium payouts for Messaging, Email App Exploits are $500,000
Zerodium payouts for Messaging, Email App Exploits are $500,000 Zerodium payouts include up to $500,000 for RCE and privilege escalation vu...
Trend Micro spotted a malvertising campaign abusing Google’s DoubleClick to deliver Coinhive Miner
Trend Micro spotted a malvertising campaign abusing Google’s DoubleClick to deliver Coinhive Miner Trend Micro uncovered a spike in the num...
Hurry up, update your Lenovo Fingerprint Manager Pro if you use Windows 7, 8 and 8.1
Hurry up, update your Lenovo Fingerprint Manager Pro if you use Windows 7, 8 and 8.1 Lenovo has fixed a hardcoded password vulnerability in...
Cryptocurrencies Black Friday – Japan-based digital exchange Coincheck hacked
Cryptocurrencies Black Friday – Japan-based digital exchange Coincheck hacked It is a black Friday for cryptocurrencies, after the news of ...
Monero Crypto-Currency Mining Operation impacted 30 Million users
Monero Crypto-Currency Mining Operation impacted 30 Million users Security experts from PaloAlto Networks uncovered a large-scale crypto-cu...
Zerodium payouts for Messaging, Email App Exploits are $500,000
Zerodium payouts for Messaging, Email App Exploits are $500,000 Zerodium payouts include up to $500,000 for RCE and privilege escalation vu...
10 Things Financially Successful People Do Differently
10 Things Financially Successful People Do Differently Financially successful people do things a little different that the rest of us. They...
7 Sure Signs That Your Workplace Is Toxic
7 Sure Signs That Your Workplace Is Toxic If your management focuses solely on what employees are doing wrong, you may be working for a tox...
The Dutch intelligence service AIVD ‘hacked’ Russian Cozy Bear systems for years
The Dutch intelligence service AIVD ‘hacked’ Russian Cozy Bear systems for years Spying on spies – The hackers from the Dutch intelligence ...
Stealth CrossRAT malware targets Windows, MacOS, and Linux systems
Stealth CrossRAT malware targets Windows, MacOS, and Linux systems The popular former NSA hacker Patrick Wardle published a detailed analys...
Spritecoin ransomware masquerades as cryptocurrency wallet and also harvests victim’s data
Spritecoin ransomware masquerades as cryptocurrency wallet and also harvests victim’s data Fortinet discovered a strain of ransomware dubbe...
libcurl has had authentication leak bug dated back to before September 1999
libcurl has had authentication leak bug dated back to before September 1999 According to a security advisory, libcurl is affected by a coup...
New HNS botnet has already compromised more than 20,000 IoT devices
New HNS botnet has already compromised more than 20,000 IoT devices A new botnet called Hide ‘N Seek (HNS botnet) appeared in the threat la...
Critical code execution flaw in Electron framework impacts popular Desktop apps such as Skype and Signal
Critical code execution flaw in Electron framework impacts popular Desktop apps such as Skype and Signal A critical RCE vulnerability in th...
Are you a Tinder user? Watch out, someone could spy on you
Are you a Tinder user? Watch out, someone could spy on you Experts at security firm Checkmarx discovered two security vulnerabilities in th...