New cybercrime monetization methods
AVG’s new report investigates a number of malicious software developments including the newly launched 2.0 version of the Blackhole Exploit Toolkit, the evolution in …
Massive WoW killing spree due to in-game exploit
What should have been a relaxing and afternoon in the virtual world of Azeroth turned to a veritable bloodbath as unknown hackers used a still unknown exploit to kill off …
“Watering hole” sites crucial to new cyber espionage campaign
RSA’s newly dubbed FirstWatch research team has recently presented their findings on a “water holing” campaign that they first spotted back in July. The …
Researchers bypass NFC access control with smartphone
A security flaw in most Mifare NFC contactless cards can easily be misused by hackers to modify the contents of the cards and get free rides on at least two U.S. transit …
iPhone buyers, beware of fake UPS notices
In view of the fact that deliveries of the extremely popular iPhone 5 will start on Friday, Websense’s director of security research Patrik Runald has issued a warning …
Microsoft promises fast fix for IE zero-day as new attacks are discovered
The problem of the remotely-exploitable IE zero-day memory-corruption vulnerability that is being misused in current attacks has reached a critical enough level for Microsoft …
The various spam campaigns leading to Blackhole
At any given time, there is a considerable number of email spam campaigns that ultimately lead users to pages hosting exploit kits – more often then not the extremely …
Blackhole 2.0 is out with new exploits and same price
A new version of BlackHole, one of the most popular exploit kits out there, has been made available by its creator, who has supposedly rewritten it from scratch. BlackHole 2.0 …
Windows 8 users open to Flash exploits
Users who have downloaded and are using the “Release To Manufacturing” version of Windows 8 or the 90-day trial version of Windows 8 Enterprise should be aware …
Zero-day-loving Google hackers furiously active in last three years
The hackers behind the Aurora attacks that were discovered targeting Google, Adobe and other big U.S. companies in 2009 have seemingly been working hard ever since. Symantec …
Spoofed Microsoft notification leads to Zeus
Microsoft has updated its Services Agreement last week, and has begun notifying its users about the change via email. Eager to take advantage of any kind of legitimate opening …
Java 0-day exploit served from over 100 sites
The problem of the two unpatched Java zero-day vulnerabilities that are actively exploited in the wild by attackers looking to gain access to their targets’ computers is …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
- Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down