Please turn on your JavaScript for this page to function normally.
Cybercriminals tailoring tactics for maximum appeal

GFI Software released its report on the most prevalent threat detections encountered during January. Last month saw malware attacks targeting a wide range of potential …

Convincing tax-themed spam leads to malware

With the US tax season underway, users are constantly being targeted with tax-themed spam. The latest one to be spotted is an email purportedly coming from Inuit, a US company …

Compromised WordPress sites lead to Phoenix exploit kit

Several hundred compromised websites that at first glance don’t appear to be malicious have been discovered by M86 researchers. The websites – mostly blogs and …

PoC exploits for Linux privilege escalation bug published

The publication of proof-of-concept exploit code for a recently spotted privilege escalation flaw (CVE-2012-0056 ) in the Linux kernel has left Linux vendors scrambling to …

Pwn2Own 2012: Changed rules, bigger prizes, no more mobile hacks

Pwn2Own, one of the most anticipated hacking contests that takes place each year at the CanSecWest conference in Vancouver, British Columbia, is set to unfold under …

DreamHost hacker accessed pool of unencrypted passwords

DreamHost, one of the world’s most popular and well-known web hosting providers, has sent a warning out to its customers saying that one of their databases containing …

Recycled cybercrime tactics adapted to conceal fraud

GFI Software released its VIPRE Report for December 2011, a collection of the most prevalent threat detections encountered during the month. Phishing campaigns once again …

Exploit code for recent ASP.NET DoS flaw made public

The ASP.NET DoS flaw that has recently been revealed at the Chaos Communication Congress in Berlin has been patched by Microsoft in almost record time, but users who have not …

Amazon users targeted with fake shipping notices

The BlackHole exploit kit has become an increasingly popular way of delivering malware to unsuspecting users. By exploiting a series of unpatched Windows, Java and Adobe …

Ransomware impersonating European police agencies

Ransomware has been around for quite some time and likely won’t disappear soon, as it usually does manage to make inexperienced users fork over to the criminals quite a …

Cutwail botnet’s various spam campaigns

The bot herders behind Cutwail – one of the oldest botnet that’s still alive and kicking and numbers over 1,5 million bots – have recently been spotted using …

ExploitHub offers cash for exploits

ExploitHub, the marketplace for penetration testers, is issuing a bounty for exploits developed against 12 high-value vulnerabilities (CVEs). Security researchers who submit …

Don't miss

Cybersecurity news