Zeljka Zorz
NIST National Vulnerability Database down due to malware
U.S. National Institute of Standards and Technology’s National Vulnerability Database is unavailable, and has been since they discovered malware on some of its servers …
Google unveils site to help webmasters recover their hacked sites
As the most widely used Internet search engine, Google Search is the de-facto starting point for hundreds of millions of queries each day. It you are an administrator of a …
Published celeb credit reports came from government-mandated website
U.S. First Lady Michelle Obama, former California Governor Arnold Schwarzenegger, former U.S. Vice President Al Gore and socialite Kris Jenner are four additional victims of …
Adobe patches Flash again, but not the flaws exploited at Pwn2Own
As promised last year, Adobe has been issuing its scheduled Flash updates on the second Tuesday of each month – the same day that Microsoft chose for its monthly Patch …
Who are the enemies of the Internet?
In their latest report on online surveillance, Reporters Without Borders have named Bahrain, China, Iran, Syria and Vietnam as “state enemies” of the Internet due …
Zoosk asks users to reset passwords following mass leak
Online dating service Zoosk is urging some of its users to change their passwords following the leaking of a list of some 29 million passwords that seemingly contains theirs. …
Hackers steal, leak financial info of U.S. celebrities and politicians
Detailed personal and financial information of a number of U.S. celebrities, politicians and a chief of police has been made public by hackers, TMZ reports. The victims of the …
DIY Steam information harvesting tool sends out mass malicious invites
Webroot’s Dancho Danchev has unearthed a DIY Steam information harvester / mass group inviter tool being offer for sale on a number of cybercrime-friendly underground …
MiniDuke does not come only via email
Researchers from Kaspersky and CrySyS Lab continue to analyze the MiniDuke backdoor and have discovered two previously unknown infection mechanisms. Recently discovered to …
Old and new botnets behind spam resurgence
Even when they have other capabilities, botnets are primarily used to send out malicious messages, since that is the easiest – not to mention the least risky – way …
Facebook’s in-house drills were crucial for smooth response to watering hole attack
Facebook was the first company to admit publicly to have been affected by the recent watering hole attack that started with a compromised forum site popular with mobile …
Pwn2Own ends with Adobe Flash, Reader and Oracle Java exploits
Day two of the Pwn2Own competition at CanSecWest was again successful for French Vupen security, as they succeeded in exploiting Adobe Flash on Internet Explorer 9 on Windows …
Featured news
Resources
Don't miss
- Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security
- AI is changing cybersecurity roles, and entry-level jobs are at risk
- From cleaners to creepers: The risk of mobile privilege escalation
- Researchers unearth keyloggers on Outlook login pages
- Hackers love events. Why aren’t more CISOs paying attention?