Zeljka Zorz
Oracle fixes Java zero-day exploited by Pawn Storm hackers
With its quarterly Critical Patch Update, Oracle has released security fixes for 193 vulnerabilities across all of its products (a good summary can be found here), including …
Duke APT group adds low-profile SeaDuke Trojan to their malware arsenal
“Not much is known about the cyber espionage group that wields the so-called “Dukes”: backdoors and information stealers that all have “Duke” in …
Adobe patches Hacking Team Flash zero-days, update immediately!
Adobe has released new versions of Flash Player, Shockwave Player and Acrobat and Reader, all of which fix critical vulnerabilities that could potentially allow an attacker to …
Firefox blocks Flash plugin by default until zero-days are fixed
For the last few years, many security experts have been urging users to evaluate whether they actually need to use Adobe Flash.The platform, once practically unavoidable, now …
65,000+ Land Rovers recalled due to software bug
Jaguar Land Rover has announced that owners of Range Rover and Range Rover Sport vehicles manufactured since 2013 will have to visit car dealers and get their car’s …
Germany’s new cyber-security law aimed at securing critical infrastructure
German institutions and businesses that fall in the “critical infrastructure” category will have to implement new information security measures, as defined by the …
More of Hacking Team’s capabilities and questionable actions revealed
The Hacking Team data leak has shown us with whom the company does business with, and their employees’ and management’s unguarded opinions about various …
Flawed Android backup mechanism can lead to injected malicious apps
A flaw (CVE-2014-7952) in Android’s backup/restore mechanism can be exploited by knowledgeable developers to “respawn” malicious apps on phones, and make …
First Java zero-day in two years exploited by Pawn Storm hackers
Another zero-day vulnerability is being exploited in attacks spotted in the wild: this time, the targeted software is Java.The flaw was spotted by Trend Micro researchers, who …
Mobile SSL failures: More common than they should be
Securing your mobile application traffic is apparently more difficult than it should be, as researchers Anthony Trummer and Tushar Dalvi discovered when looking into SSL/TLS …
Two more Flash 0-day exploits found in Hacking Team leak, one already exploited in the wild
Exploits for two more Adobe Flash 0-days have been found in the leaked Hacking Team data. The existence of the vulnerabilities has been acknowledged by Adobe with a security …
Apple to introduce two-factor authentication option in iOS 9 and OS X El Capitan
Starting with OS X 10.11 (“El Capitan”) and iOS 9, Apple will introduce a two-factor authentication option that will replace the current two-step verification …
Featured news
Resources
Don't miss
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)
- Exposure management is the answer to: “Am I working on the right things?”
- Cyberattacks are changing the game for major sports events
- Can your security stack handle AI that thinks for itself?
- July 2025 Patch Tuesday forecast: Take a break from the grind