Please turn on your JavaScript for this page to function normally.
IE flaw targeted in Aurora attacks still actively exploited

Regular software patching is often touted as one of the best things you can do to keep your computer safe against malware infection. Unfortunately, not all users follow that …

Flaw in Nvidia’s rendering software allows hijacking of “computer farms”

A vulnerability in Nvidia mental ray, an extremely popular 3D-rendering software that is often used on “render farms”, could allow attackers to take control of …

Alleged Blackhole author and gang prosecuted in Russia

Paunch, the creator of the infamous Blackhole exploit kit, is being prosecuted along with 12 other individuals involved in a Russia-based cybercrime ring, the Russian Ministry …

Netflix users in danger of unknowingly picking up malware

Users of Silverlight, Microsoft’s answer to Adobe Flash, are in danger of having malware installed on their computers and being none the wiser, as an exploit for a …

Watch out for less advanced malware and new exploit kits

This year, cybersecurity took center stage with nation-state attacks, numerous high-profile data breaches and prominent cybercriminal arrests. Websense Security Labs outlined …

Spam campaign doubles on threats

Some malware peddlers might be moving on from using the Blackhole exploit kit to deliver malicious code, but others are still not ready to give up on it, as proven by a spam …

New IE 0-day actively exploited by Chinese attackers

After having discovered a new IE zero-day exploit being actively used in the wild, FireEye researchers have revealed that the watering hole attack is more than likely mounted …

Cryptolocker surge directly tied with Blackhole downfall

The recent emergence of Cryptolocker as one of the most widespread, visible and deadly threats is directly tied to the arrest of “Paunch”, the creator of the …

New Microsoft 0-day vulnerability under attack

Microsoft has released security advisory KB2896666 informing of a vulnerability (CVE-2013-3906) in the TIFF graphics format that is seeing limited attacks in the Middle East …

Triumfant detects and stops in-memory malware attacks

Advanced Volatile Threats are malware attacks that take place in a computer’s RAM or other volatile memory, and are difficult to detect because they are never stored to …

Solving the dilemma of vulnerability exploitation disclosure

The subject of software and hardware vulnerability disclosure has been debate time and time again, and most agree that, if possible, vulnerabilities should first be disclosed …

Patched IE zero-day and older flaw exploited in ongoing targeted attacks

With this month’s Patch Tuesday, Microsoft has delivered the patch for the infamous Internet Explorer zero-day (CVE-2013-3893) that has been spotted being used in …

Don't miss

Cybersecurity news