Zeljka Zorz
Active campaigns deliver old and new ransomware families
Cyber crooks’ love for ransomware continues unabated, and user are warned about several active campaigns trying to deliver the malware on target computers. The campaigns …
The Pentagon is looking to hire 3,000 infosec pros
The US Department of Defense has gotten permission and is aiming to hire 3,000 infosec professionals to work at the US Cyber Command by the end of this year, and is set to …
μTorrent comes bundled with crypto-miner, users are furious
BitTorrent, the company responsible for the development of the BitTorrent peer-to-peer protocol as well as that of μTorrent, a widely used torrent client, has been …
Seagate acknowledges NAS 0-day, announces patch
After security researcher OJ Reeves publicly revealed the existence of a remote code execution zero-day flaw affecting Seagate’s Business Storage 2-Bay NAS line of …
UK: 57 arrested for cyber crime, including US DoD hacker
Last week was a busy one for UK law enforcement, as agents from the National Cyber Crime Unit (NCCU) of the National Crime Agency (NCA) spearheaded a nationwide cyber crime …
The C99Shell PHP backdoor lives on
The C99Shell PHP backdoor, originally spotted in 2007, is still around, and is still a danger to both web server operators and end-users. After getting a tip from a designer …
Fake “Flash Player Pro” update delivers password-stealing Trojan
Researchers are warning about a new malware delivery campaign aimed at spreading Fareit, a password-stealing Trojan that can also download additional malware. This campaign is …
Adobe launches bug disclosure program, skimps on bounties
Adobe has launched its own web application vulnerability disclosure program. Set up through the bug bounty platform HackerOne, the program is limited to vulnerabilities …
NLPRank: An innovative tool for blocking APT malicious domains
Security researchers working at OpenDNS’ Security Labs have developed NLPRank, a new system that helps detect – quickly and relatively accurately – phishing …
Anthem refuses comprehensive IT security audit after the breach
Recently breached US health insurer Anthem has refused to let The Office of Personnel Management’s Office of Inspector General (OIG) perform a full security audit of its …
Angler exploit kit and domain shadowing: A deadly combination
Attackers wielding the infamous Angler exploit kit are increasingly using hijacked registrant accounts to create huge amounts of subdomains for both redirecting victims and …
Mandarin Oriental suffers credit card breach
Mandarin Oriental, the hotel group managing luxury hotels and resorts in Asia, Europe, the US and Latin America, has confirmed that “the credit card systems in an …
Featured news
Resources
Don't miss
- Why AI code assistants need a security reality check
- GPS tracker detection made easy with off-the-shelf hardware
- 91% noise: A look at what’s wrong with traditional SAST tools
- AWS launches new cloud security features
- Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)