85 Millions of voter records available for sale ahead of the 2018 US Midterm Elections Ahead of the 2018 US midterm elections, sellers are ...
The Radisson Hotel Group has suffered a data breach
The Radisson Hotel Group has suffered a data breach The hotel chain Radisson Hotel Group suffered a security breach that exposed personal i...
Just my RANT! People Problems Progress
Just my RANT! People Problems Progress Here comes the bloody RANT! It has been awhile since i spent time in front of my laptop looking at ...
Adware already infected at least 78000 Fortnite Players
Adware already infected at least 78000 Fortnite Players Rainway reported that tens of thousands of Fortnite players have been infected with...
The GandCrab ransomware V4 appears in the threat landscape
The GandCrab ransomware V4 appears in the threat landscape A new variant of the infamous GandCrab ransomware V4 was released during the wee...
Cyber mercenaries and insiders hired by Chinese intelligence to hack aerospace and tech firms
Cyber mercenaries and insiders hired by Chinese intelligence to hack aerospace and tech firms According to the U.S. Department of Justice, ...
A few hours after Apple released iOS 12.1, a researcher presented a Passcode Bypass issue
A few hours after Apple released iOS 12.1, a researcher presented a Passcode Bypass issue A few hours after Apple released iOS 12.1 the iPh...
Girl Scouts data breach exposed personal information of 2,800 members
Girl Scouts data breach exposed personal information of 2,800 members A Girl Scouts of America branch in California suffered a security bre...
Windows Defender is the first antivirus solution that can run in a sandbox
Windows Defender is the first antivirus solution that can run in a sandbox Windows Defender, the Windows built-in anti-malware tool, implem...
The author of the Mirai botnet gets six months of house arrest
The author of the Mirai botnet gets six months of house arrest Paras Jha (22), the author of the Mirai botnet has been sentenced to six mon...
Recently discovered DemonBot Botnet targets Hadoop servers
Recently discovered DemonBot Botnet targets Hadoop servers Security experts from Radware have spotted a new botnet dubbed DemonBot that it ...
Huawei enterprise and broadcast products have a crypto bug. Fix it now!
Huawei enterprise and broadcast products have a crypto bug. Fix it now! Huawei has rolled out security fixes for some enterprise and broadc...
Siemens warns of several flaws affecting Central Plant Clocks
Siemens warns of several flaws affecting Central Plant Clocks Siemens disclosed several vulnerabilities in some of its SICLOCK central plan...
Rowhammer Evolves into RAMpage Exploit, Targeting Android Phones Since 2012
Rowhammer Evolves into RAMpage Exploit, Targeting Android Phones Since 2012 rThis week researchers demonstrated that most Android phones re...
Systemd flaw could cause the crash or hijack of vulnerable Linux machines
Systemd flaw could cause the crash or hijack of vulnerable Linux machines Systemd is affected by a security vulnerability that can be explo...
IBM buys Red Hat for $34 Billion, it is largest software transaction in history
IBM buys Red Hat for $34 Billion, it is largest software transaction in history IBM announced it is going to buy the open source company Re...
Crooks continue to abuse exposed Docker APIs for Cryptojacking
Crooks continue to abuse exposed Docker APIs for Cryptojacking Cybercriminals continue to abuse unprotected Docker APIs to create new conta...
Security Affairs newsletter Round 186 – News of the week
Security Affairs newsletter Round 186 – News of the week A new round of the weekly SecurityAffairs newsletter arrived! The best news of the...
The Belgacom hack was the work of the UK GCHQ intelligence agency
The Belgacom hack was the work of the UK GCHQ intelligence agency Belgian newspaper reported that investigators had found proof that the Be...
How to deliver malware using weaponized Microsoft Office docs embedding YouTube video
How to deliver malware using weaponized Microsoft Office docs embedding YouTube video Researchers at Cymulate security firm devised a new s...
Apple and Samsung fined millions for “planned obsolescence” of old smartphones
Apple and Samsung fined millions for “planned obsolescence” of old smartphones Italian Competition Authority AGCM fined Apple and Samsung a...
Iranian Charming Kitten ATP group poses as Israeli cybersecurity firm in phishing campaign
Iranian Charming Kitten ATP group poses as Israeli cybersecurity firm in phishing campaign Iranian APT groups continue to very active, rece...
A Samsung Texting App bug is sending random photos to contacts
A Samsung Texting App bug is sending random photos to contacts Some Samsung devices are randomly sending photos taken with the camera to co...
Facebook is notifying 800,000 users affected by a blocking bug
Facebook is notifying 800,000 users affected by a blocking bug Yesterday the social network giant Facebook started notifying 800,000 users ...
A few dollars to bring down sites with new Bushido-based DDoS-for-hire service
A few dollars to bring down sites with new Bushido-based DDoS-for-hire service Security researchers at FortiGuard Labs have discovered a ne...
British Airways: additional 185,000 passengers may have been affected
British Airways: additional 185,000 passengers may have been affected The data breach suffered by the British Airways airline is worse than...
CVE-2018-14665 privilege escalation flaw affects popular Linux distros
CVE-2018-14665 privilege escalation flaw affects popular Linux distros Security researcher discovered a highly critical vulnerability (CVE-...
The Social network giant Facebook confirms it shared data with 61 tech firms after 2015
The Social network giant Facebook confirms it shared data with 61 tech firms after 2015 On Friday, Facebook provided a 748-page long report...
Microsoft revealed that 2 Zero-Days found in March were part of a cyber weapon in an early development stage
Microsoft revealed that 2 Zero-Days found in March were part of a cyber weapon in an early development stage Microsoft published technical ...
NSA began deleting all call detail records (CDRs) acquired since 2015
NSA began deleting all call detail records (CDRs) acquired since 2015 NSA is deleting hundreds of millions of records of phone calls and te...
Experts presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol
Experts presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol Security experts Antonio Pirozzi and Pierluig...
Experts released a free Decryption Tool for GandCrab ransomware
Experts released a free Decryption Tool for GandCrab ransomware Good news for the victims of the infamous GandCrab ransomware, security exp...
UK ICO fines Facebook with maximum for Cambridge Analytica scandal
UK ICO fines Facebook with maximum for Cambridge Analytica scandal Facebook has been fined £500,000 by the UK’s Information Commissioner’s ...
Google requires 2 years of Android security updates for popular devices
Google requires 2 years of Android security updates for popular devices The media outlet The Verge obtained a copy of a contract between Go...
Experts discovered a severe command injection flaw in Cisco Webex Meetings Desktop
Experts discovered a severe command injection flaw in Cisco Webex Meetings Desktop Researchers discovered a “high” severity command injecti...
Cathay Pacific data breach affecting 9.4 million passengers
Cathay Pacific data breach affecting 9.4 million passengers Cathay Pacific Airways Limited, the flag carrier of Hong Kong, had suffered a m...
Magecart hackers change tactic and target vulnerable Magento extensions
Magecart hackers change tactic and target vulnerable Magento extensions Magecart cybercrime gang made the headlines again, the cyber crimin...
SandboxEscaper expert is back and disclosed a new Windows Zero-Day
SandboxEscaper expert is back and disclosed a new Windows Zero-Day The security researcher SandboxEscaper has released the proof-of-concept...
NSA began deleting all call detail records (CDRs) acquired since 2015
NSA began deleting all call detail records (CDRs) acquired since 2015 NSA is deleting hundreds of millions of records of phone calls and te...
NSA began deleting all call detail records (CDRs) acquired since 2015
NSA began deleting all call detail records (CDRs) acquired since 2015 NSA is deleting hundreds of millions of records of phone calls and te...
Trezor users targeted by phishing attacks, experts blame DNS Poisoning or BGP Hijacking
Trezor users targeted by phishing attacks, experts blame DNS Poisoning or BGP Hijacking The maintainers of the Trezor multi-cryptocurrency ...
Chalubo, a new IoT botnet emerges in the threat landscape
Chalubo, a new IoT botnet emerges in the threat landscape Security experts from Sophos Labs have spotted a new piece of IoT malware tracked...
Russian Government-owned research institute linked to Triton attacks
Russian Government-owned research institute linked to Triton attacks Security experts from FireEye found evidence that links the developmen...
Message Decryption Key for Signal Desktop application stored in plain text
Message Decryption Key for Signal Desktop application stored in plain text The reverse engineer researcher Nathaniel Suchy discovered that ...
The new Azorult 3.3 is available in the cybercrime underground market
The new Azorult 3.3 is available in the cybercrime underground market A new version of the Azorult info-stealer appeared in the wild, it is...
To Secure Medical Devices, the FDA Turns to Ethical Hackers
To Secure Medical Devices, the FDA Turns to Ethical Hackers The U.S. Food and Drug Administration (FDA) is embracing the work of ethical ha...
The fix for the DOM-based XSS in Branch.io introduced a new XSS flaw
The fix for the DOM-based XSS in Branch.io introduced a new XSS flaw The security patch for the recently disclosed cross-site scripting (XS...
For the first time Japanese commission ordered Facebook to improve security
For the first time Japanese commission ordered Facebook to improve security The Japanese government ordered Facebook to improve the protect...
Saudi Future Investment Initiative website defaced by the hackers
Saudi Future Investment Initiative website defaced by the hackers Hackers defaced Future Investment Initiative (FII) website for a Saudi in...
RIG Exploit Kit operators leverage PROPagate Injection Technique to deliver Miner
RIG Exploit Kit operators leverage PROPagate Injection Technique to deliver Miner FireEye reported the PROPagate code injection technique t...
A sample of CryptoCurrency Clipboard Hijackers monitors 2.3 Million Bitcoin addresses
A sample of CryptoCurrency Clipboard Hijackers monitors 2.3 Million Bitcoin addresses A sample of CryptoCurrency Clipboard Hijackers discov...
Zerodium offers up to $500,000 for Linux Zero-Day exploits
Zerodium offers up to $500,000 for Linux Zero-Day exploits The sale of Zero-day exploits is a prolific business, zero-day broker Zerodium o...
MPlayer and VLC media player affected by critical flaw CVE-2018-4013
MPlayer and VLC media player affected by critical flaw CVE-2018-4013 Cisco Talos expert discovered a code execution vulnerability (CVE-2018...
Israel Defense Forces were searching systems to spy on private social media messages
Israel Defense Forces were searching systems to spy on private social media messages The Israel Defense Forces has bid to obtain spying sys...