Zeljka Zorz
Newly disclosed Logjam bug might be how the NSA broke VPNs
Another vulnerability courtesy of 1990s-era US export restrictions on cryptography has been discovered, and researchers believe it might be how the NSA managed to regularly …
Bug in NetUSB code opens networking devices to remote code execution
Researchers from SEC Consult have published details of a critical kernel stack buffer overflow vulnerability in NetUSB, a software component that provides “USB over …
Hackers breached subsea cable operator Pacnet’s corporate IT network
Global telecommunications service provider and fibre optic subsea cable operator Pacnet has suffered a breach: unknown hackers have gained access to its corporate IT network …
South Korean minors to be monitored via smartphone spying apps
The Korea Communications Commission, South Korea’s media regulation agency modeled after US’ FCC, has made it mandatory for telecoms and parents to install a …
Fake PayPal payment reversal notification leads to phishing
PayPal phishing attempts take many forms, and one of the most often used techniques is fake emails containing a warning and a prompt to act quickly.An active phishing campaign …
Address spoofing Safari bug opens door for phishing attacks
Hacker David Leo has released a PoC exploit for a Safari vulnerability that can be misused to trick users into thinking they are on one site while they are actually on another …
Trojanized, info-stealing PuTTY version lurking online
“A malicious version of the popular open source Secure Shell (SSH) client PuTTY has been spotted and analyzed by Symantec researchers, and found to have …
How much money do cyber crooks collect via crypto ransomware?
“FireEye researchers have calculated that the cybercriminals wielding TeslaCrypt and AlphaCrypt have managed to extort $76,522 from 163 victims in only two months. …
Penn State engineering network is taken offline following two cyberattacks
The computer network of Pennsylvania State University’s College of Engineering has been temporarily disconnected from the Internet in the wake of two “highly …
European Internet users urged to protect themselves against Facebook tracking
In the wake of the revelations about Facebook’s tracking of users who do not own a Facebook account, the Belgian Privacy Commission has issued a set of recommendations …
Rogue GTA 5 mods carry password-stealing malware
“Gamers who choose to play Grand Theft Auto V (GTA 5) on their PC should be carefull not to install two game mods that have been found to be bundled with malware. …
Rombertik’s disk wiping mechanism is aimed at pirates, not researchers
Rombertik, the information-stealing malware that was recently analyzed by Cisco researchers and which apparently tries to prevent researchers from doing so by rewriting the …
Featured news
Resources
Don't miss
- AWS launches new cloud security features
- Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)
- Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security
- AI is changing cybersecurity roles, and entry-level jobs are at risk
- From cleaners to creepers: The risk of mobile privilege escalation