Zeljka Zorz
11-year-old VM escape bug opens host machines to compromise
CrowdStrike researchers have recently discovered a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms, which could be …
BitTorrent releases free P2P private voice and text app
After an initial pre-alpha release in July 2014, BitTorrent’s peer-to-peer private voice and text app Bleep is finally available for curious Windows, Mac, iOS and …
Scammers are draining payment cards linked with Starbucks customer accounts
Scammers are actively targeting Starbucks customers and syphoning money from the credit or debit card they have tied to their Starbucks accounts.In order to perform this …
May Patch Tuesday delivers critical and important fixes
In this month’s Patch Tuesday Microsoft has released 13 security bulletins addressing 48 vulnerabilities in Internet Explorer, Windows, Office, and Silverlight.Over half …
Former employee claims cybersecurity firm extorted clients
Tiversa, a privately held cybersecurity company based in Pittsburgh, Pennsylvania, has been accused by a former employee of hacking and then trying to effectively extort money …
US Passport Agency contractor stole applicants’ data to steal their identities
Three women from Houston, Texas, stand accused of engaging in an identity theft scheme in which one of them, a contract employee of the Department of State Passport Agency, …
Cyber extortionists are hitting hedge funds
Hedge funds are increasingly targeted by cyber extortionists, John Carlin, US Assistant Attorney General for National Security, has warned the audience at the SALT hedge fund …
Angler EK pushes unnamed ransomware
“Malware distribution campaigns based using the popular Angler exploit kit continue delivering different types of ransomware. Last week, it was AlphaCrypt, which …
Tor Cloud project reaches the end of the line
The Tor Project has discontinued the Tor Cloud project due to a lack of dedicated software developers and maintainers.The Tor Cloud project was started in late 2011, with the …
Flawed crypto endangers millions of smart grid devices
The cryptography used in the Open Smart Grid Protocol (OSGP), one of the most widely used smart meter and smart grid device networking standards, can be easily cracked, …
Breaking Bad-themed ransomware targeting users
“A new type of ransomware is targeting Australian users, and its creators have decided to have some fun and express their love for the popular US TV show Breaking Bad …
Court declares NSA’s domestic phone metadata collection program illegal
It took nearly two years, but three judges of a federal appeals court in New York have unanimously ruled that the bulk collection of telephone metadata associated with phone …
Featured news
Resources
Don't miss
- Why your security team feels stuck
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)