Zeljka Zorz
Cyber crooks take advantage of ad bidding networks to deliver ransomware
Malware peddlers are taking advantage of real time advertising bidding networks to deliver ransomware to unsuspecting users, FireEye researchers are warning. “Real Time …
Analysis of Equation Group’s espionage platform discovers another link to the NSA
Kaspersky Lab researchers continue to analyze the software and digital artifacts tied to the Equation Group, a nation-state threat actor that has been active for almost twenty …
Microsoft patches flaw exploited by Stuxnet – again
Among the vulnerabilities patched by Microsoft in this month’s Patch Tuesday is one that was supposedly patched back in 2010. The Windows Shell Shortcut Icon Loading …
Flaw in Dropbox SDK for Android lets attackers steal data sent to users’ account
Researchers from IBM’s security team have discovered an authentication flaw in the Dropbox Software Development Kit (SDK) for Android that can be exploited to capture …
Unpatched security vulnerabilities affecting Facebook
A web security researcher from Portugal has discovered several vulnerabilities affecting Facebook that he considers to be serious, but hasn’t had much success convincing …
Apple Watch scams target Twitter and Facebook users
It didn’t take long for spammers to jump on the Apple Watch bandwagon – they set up a Twitter account named “Apple Giveaways”, and began spamming out …
Core Infrastructure Initiative kickstarts OpenSSL audit
Cryptography Services, a team of consultants from several security research firms, have announced that they have been tasked with auditing OpenSSL, the popular and widely used …
Beware of fake invites for WhatsApp’s Free Voice Calling feature!
Fake WhatsApp invites are actively luring users to sites where they are urged to fill out surveys and download unknown applications, warns The Hacker News’ Mohit Kumar. …
Apple issued update for FREAK flaw in OS X and iOS
Apple has released security updates for OS X and iOS which, among other things, fix the FREAK flaw that may allow an attacker to decrypt secure communications between …
Active campaigns deliver old and new ransomware families
Cyber crooks’ love for ransomware continues unabated, and user are warned about several active campaigns trying to deliver the malware on target computers. The campaigns …
The Pentagon is looking to hire 3,000 infosec pros
The US Department of Defense has gotten permission and is aiming to hire 3,000 infosec professionals to work at the US Cyber Command by the end of this year, and is set to …
μTorrent comes bundled with crypto-miner, users are furious
BitTorrent, the company responsible for the development of the BitTorrent peer-to-peer protocol as well as that of μTorrent, a widely used torrent client, has been …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground