Please turn on your JavaScript for this page to function normally.
Skull
Explosive global attack delivers destructive Petya ransomware

Less than two months after the disastrous, global WannaCry infestation, a variant of the Petya ransomware dubbed PetrWrap has started hitting companies in Ukraine, Russia and …

hole
Google researcher uncovers another RCE in Microsoft Malware Protection Engine

Google Project Zero researcher Tavis Ormandy has unearthed yet another critical remote code execution vulnerability affecting the Microsoft Malware Protection Engine, which …

DDoS
South Korean banks threatened with DDoS attacks unless they pay $315,000

South Korean banks are being threatened with crippling DDoS attacks unless they pay $315,000 in bitcoin. The attackers threatening them identified themselves as the Armada …

Telegram
Russia threatening to ban Telegram encrypted messaging app

Roskomnadzor, Russia’s communications regulator, is threatening to ban the use of popular encrypted messaging app Telegram. The request Roskomnadzor is a federal agency …

Anthem
Anthem ready to pay $115 million to settle data breach lawsuit

US health insurer Anthem has agreed to pay $115 million to settle a class-action suit mounted in the wake of the massive data breach it suffered in late 2014/early 2015. The …

Berlin
German law enforcement gets new hacking powers

On Thursday, the Bundestag has voted to accept a new amendment that will expand the German police’s hacking powers. The new amendment will allow them to use so-called …

CIA
How the CIA gained access to air-gapped computers

A new WikiLeaks release of documents believed to have been stolen from the CIA show the intelligence agency’s capability to infect air-gapped computers and networks via …

password
Password Reset MITM: Exposing the need for better security choices

Attackers that have set up a malicious site can use users’ account registration process to successfully perform a password reset process on a number of popular websites …

BEC scams
Internet crime: The continuing rise of the BEC scam

Through its website, the FBI’s Internet Crime Complaint Center (IC3) accepts complaints about Internet-facilitated criminal activity, and forwards them to the …

Microsoft Edge
Microsoft extends the Microsoft Edge Bounty Program

Initially time-bound, the Microsoft Edge Bounty Program has now been turned into one that will run indefinitely, Microsoft has announced. The past and present of the Microsoft …

lock
Businesses finally realize that cyber defenses must evolve

Cybersecurity is finally getting the attention it deserves – it is only regrettable that this good news is the result of bad news: more numerous, complex, and damaging …

structure
Forget about the malware, go after attackers’ tactics, techniques and procedures

The cybercriminal’s options for monetizing attacks has never been broader, less complex, or less risky, and attempts to detect intrusions by detecting the malware they …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools