Zeljka Zorz
GPG Sync: Internal GPG keys syncing tool for orgs
First Look Code has released GPG Sync, an open source tool for keeping a list of GPG keys used by members of an organization always updated, and always available to all of …
VeraCrypt security audit reveals many flaws, some already patched
VeraCrypt, the free, open source disk encryption software based on TrueCrypt, has been audited by experts from cybersecurity company Quarkslab. The researchers found 8 …
Ghost Push Trojan still a major threat to most Android users
The Ghost Push Trojan (also known as Shedun) is still a considerable threat to Android users around the world. The malware is focused on displaying ads, promoting webpages and …
Net Cease: Microsoft researchers unveil anti-reconnaissance tool
Microsoft researchers Itai Grady and Tal Be’ery have released Net Cease, a PowerShell script that prevents attackers who have already compromised an endpoint from …
Android banking Trojan asks victims to send selfies with ID cards
The Acecard Android Trojan is a threat that has been around for quite some time. Its main goal is to collect login credentials used by the victims to access their online …
Mirai malware is infecting Sierra Wireless cellular network equipment
AirLink cellular gateway devices by Sierra Wireless are being infected by the infamous Mirai malware. Sierra Airlink models LS300, GX400, GX/ES440, GX/ES450, and RV50 are …
Review: Threat Forecasting
About the authors John Pirc is Director of Security Solutions for Forsythe Technology and an advisor to HP’s CISO on Cyber Security. David DeSanto is the Director, Products …
Released: 1Password Teams for Windows
AgileBits, the company behind popular password manager 1Password, has finally released 1Password Teams for Windows (6.0). 1Password Teams works just like the individual …
Clinton campaign chief’s Twitter, iCloud accounts hijacked
Some 12 hours after WikiLeaks published emails stolen from the email account of Hillary Clinton campaign Chairman John Podesta, someone has hijacked the man’s Twitter …
Quickly audit and adjust SSH server configurations with SSH-audit
SSH-audit is a standalone open source tool for auditing and fixing SSH server configurations. It has no dependencies and will run wherever Python is available. It supports …
6000+ compromised online shops – and counting
A week ago, RiskIQ researchers revealed that over 100 online shops have, at one point in the last six months, been injected with malicious JavaScript code that exfiltrates …
Twitter, Facebook revoke access to social media surveillance software used by cops
Geofeedia, a US-based company that offers its social media aggregation platform “to a broad range of private and public sector clients”, also numbers among its …
Featured news
Resources
Don't miss
- Ivanti EPMM exploitation: Researchers warn of “sleeper” webshells
- Microsoft begins Secure Boot certificate update for Windows devices
- Microsoft Patch Tuesday: 6 exploited zero-days fixed in February 2026
- That “summarize with AI” button might be manipulating you
- Groupe Rocher CISO on strengthening a modern retail cybersecurity strategy