Zeljka Zorz
IE 0-day used in watering hole attack tied to previous campaigns
An Internet Explorer zero-day vulnerability (CVE-2014-0322) is actively exploited in the wild in a watering-hole attack targeting visitors to the official website of the U.S. …
Fake SSL certificates used to impersonate Facebook, Google, banks
Analysts with UK-based Internet research firm Netcraft have discovered a considerable number of fake SSL certificates in the wild, created to impersonate banks, social …
Linksys home routers targeted and compromised in active campaign
A yet undetermined vulnerability affecting certain Linksys WiFi routers is being actively and massively exploited in the wild to infect the devices with a worm dubbed …
Bogus Microsoft “Reactivate Your Email Account” emails doing rounds
Phishing emails purportedly sent by Microsoft are targeting the company’s customers and trying to get them to reveal their login credentials and some personal …
Mac Bitcoin-stealing Trojan lurks on download sites and GitHub
CoinThief, the recently discovered Bitcoin-stealing Trojan that targets Mac users, has been spotted being offered on several download websites such as CNET’s …
Hit with DoS, several Bitcoin exchanges suspend withdrawals
As popular Bitcoin exchanges continue to be bombarded with malformed transactions, a lot of them have decided to temporarily prevent its customers to withdraw their funds. The …
HP says server security and safety updates will remain free
The news that starting on February 19, HP will provide firmware updates for its servers only to customers with a valid warranty, Care Pack Service or support agreement, has …
Modular Corcow banking Trojan poised for success
Banking Trojans are among the most used stealthy malware, and the most popular ones are undoubtedly Zeus, SpyEye, Citadel and Carberp. Still, that doesn’t mean there is …
400Gbps NTP-based DDoS attack hits Cloudflare
Matthew Prince, CEO of content delivery network Cloudflare, has confirmed on Twitter on Monday that one of its customers was being targeted with a very big Network Time …
Older Flash Player vulnerability exploited in the wild
Microsoft researchers have also recently discovered several attacks in the wild exploiting another Flash Player vulnerability (CVE-2013-5330) on Windows, Linux and OS X. This …
Microsoft introduces multifactor authentication for all Office 365 users
In a praiseworthy move, Microsoft has extended the multifactor authentication option to all users of Office 365, its popular subscription-based online office software suite. …
Beware of Trojanized Flappy Bird game
Trojanized versions of Flappy Bird, the mega-popular iPhone and Android game that has recently been pulled from Google Play and Apple’s App Store by its creator, have …
Featured news
Resources
Don't miss
- Protecting farms from hackers: A Q&A with John Deere’s Deputy CISO
- LLMs at the edge: Rethinking how IoT devices talk and act
- How to build a secure AI culture without shutting people down
- ScreenConnect admins targeted with spoofed login alerts
- Fake macOS help sites push Shamos infostealer via ClickFix technique