Zeljka Zorz

Privilege escalation on Unix machines via plugins for text editors
Several of the most popular extensible text editors for Unix environments could be misused by attackers to escalate privileges on targeted systems, SafeBreach researchers have …

Cambridge Analytica and Facebook’s privacy storm: Latest developments
A day before the most recent exposé on Strategic Communication Laboratories (SCL)/Cambridge Analytica’s exploitation of user data syphoned out of Facebook to fuel …

New Intel processors to have hardware-based protections against Meltdown, Spectre 2
Intel has officially pushed out microcode updates with Spectre and Meltdown mitigations for all of the processors it launched in the past five years. In addition to this, the …

Former Equifax exec charged with insider trading after data breach
Jun Ying, a former Equifax executive, has been hit with criminal charges as well as SEC (Securities and Exchange Commission) charges for insider trading relating to his sales …

Microsoft kicks off bounty program for speculative execution bugs
Microsoft wants security researchers to search for and report speculative execution side channel vulnerabilities (a hardware vulnerability class that affects CPUs from …

Firefox news: Fresh releases, Firefox Quantum for Enterprise, privacy protections
Firefox 59 (for desktop and mobile) and Firefox ESR 52.7 have been released to the public. Privacy enhancements and security fixes The former sports some performance …

Dangerous CredSSP flaw opens door into corporate servers
A critical vulnerability in the Credential Security Support Provider protocol (CredSSP), introduced in Windows Vista and used in all Windows versions since then, can be …

Researchers find critical flaws in SecurEnvoy SecurMail, patch now!
If you’re a user of SecurEnvoy SecurMail and you haven’t yet implemented the latest patch, do so now – or risk getting your encrypted emails read by …

Binance offers $250,000 for info about hackers who targeted its users
Binance, the popular Chinese cryptocurrency exchange focusing on crypto-to-crypto trading, has put a $250,000 bounty on the heads of the attackers who tried to pull off a …

Robots hijacked by ransomware may soon become a reality
How soon will we see our home, office or industrial robots being hijacked and held ransom by attackers? If they dedicate their efforts to research, that day may come sooner …

Vulnerable Apache Solr, Redis, Windows servers hit with cryptominers
Vulnerable servers of all kinds are being targeted, compromised and made to mine cryptocurrencies for the attackers. Apache Solr servers under attack SANS ISC handler Renato …

Cisco fixes critical flaw in its Secure Access Control System
Cisco has pushed out fixes for security vulnerabilities in a wide variety of its products, including two critical flaws in its Secure Access Control System (ACS) and its Prime …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!