Teen exploits three 0-days to hack Chrome, earns $60K from Google
The end of this year’s editions of the Pwn2Own and Pwnium contests has been marked by another Chrome hack, executed by a teenage security researcher that goes by the …
Flash vulnerability exploited to deliver malware
Attackers are once again exploiting the public’s tendency for not keeping its software updated and its ongoing interest about Iran and its nuclear program to infect …
Bogus US SEC notification leads to malware
Notifications purportedly sent by the US Securities and Exchange Commission have been hitting inboxes and trying to trick users into following a malicious link, warns GFI. The …
Eliminating malware resident on file shares
FireEye announced its File Malware Protection System (MPS) that detects and eliminates advanced malware found on file shares. The solution prevents the lateral spread of …
Pastry lovers served with ransomware via exploit kit
French cake and pastry lovers have been targeted by cyber crooks as the website of the famous confectionery company Laduree has been compromised and found serving ransomware. …
Metasploit identifies IPv6 security risks
Rapid7 announced that the new version of Metasploit 4.2 allows users to fully test whether IPv6 addresses on their network are vulnerable to cyber attacks. This is …
Gap in patch priorities vs cybercriminal targets
Internet users are at risk from the rapid growth in software security flaws – specifically end-point vulnerabilities. Businesses should be doing far more to help …
The evolution of targeted attacks and exploit kits
There’s been a significant growth in cybercrime, via sophisticated targeted attacks and social media scams, as well as a rise in malicious email attachments, despite a …
Cybercriminals tailoring tactics for maximum appeal
GFI Software released its report on the most prevalent threat detections encountered during January. Last month saw malware attacks targeting a wide range of potential …
Convincing tax-themed spam leads to malware
With the US tax season underway, users are constantly being targeted with tax-themed spam. The latest one to be spotted is an email purportedly coming from Inuit, a US company …
Compromised WordPress sites lead to Phoenix exploit kit
Several hundred compromised websites that at first glance don’t appear to be malicious have been discovered by M86 researchers. The websites – mostly blogs and …
PoC exploits for Linux privilege escalation bug published
The publication of proof-of-concept exploit code for a recently spotted privilege escalation flaw (CVE-2012-0056 ) in the Linux kernel has left Linux vendors scrambling to …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations