Please turn on your JavaScript for this page to function normally.
Will the Sweet Orange exploit kit dethrone Blackhole?

There’s a new exploit kit being offered for sale and it seems to be slowly but surely gaining in popularity. Dubbed Sweet Orange, the kit uses exploits for Java, PDF, IE …

Cloud exploits and mobile device attacks on the horizon

Although many security experts predict that the most likely data breach threats organizations will face in 2013 include cloud exploits, mobile device attacks and all-out cyber …

Exploits, security threats and hacks will mutate in 2013

Lamar Bailey, Director of Security Research and Development with nCircle, has released his top five security threats to watch out for in 2013. The New Year – and beyond …

Fake CitiBank credit card statement leads to malware

CitiBank customers are advised to tread carefully through their email inboxes as fake credit card statements sporting the bank’s name could be waiting for them: The …

ExploitHub confirms breach

ExploitHub.com, the well-known online marketplace where one can buy exploit code for disclosed vulnerabilities, has confirmed that its web application server was compromised, …

Exploit tool hitting Joomla and WordPress sites

Joomla and WordPress sites’ administrators should consider updating to the latest version of their respective content management system as soon as possible since, …

Six threats to watch out for in 2013

FortiGuard Labs revealed its 2013 threat predictions, highlighting six threats to watch out for next year. 1. APTs Target Individuals through mobile platforms APTs also known …

Exploit kit authors thrive due to PoC code released by whitehats

Do exploit kit authors actually write the exploits they include in their offerings? Sophos’ researcher Gabor Szappanos says the answer is a resounding “No.” …

80% of attacks are redirects from legitimate sites

Sophos released its Security Threat Report 2013, a detailed and interactive assessment of what’s happened in IT security for 2012 and what’s expected for 2013. …

Researcher releases a slew of MySQL and SSH exploits

Security professional Nikolaos Rangos, who is better known by his online handle Kingcope, has flooded the Full Disclosure mailing list over the weekend with information and …

Bogus Apple invoice leads to Blackhole, banking malware

If you receive an invoice seemingly coming from Apple that apparently shows that your credit card has been billed for $699,99 (or a similar preposterously huge amount of …

Blackhole exploits lead a black month for malware

In October, GFI Software threat researchers uncovered a large number of Blackhole exploits disguised as Windows licenses (just prior to the release of Windows 8), Facebook …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools