
Can SourceForge win developers’ trust back?
SourceForge is under new ownership and management (again!), and their plan is to return the service to its former glory. The past Once the preferred source code repository and …

Let’s Encrypt CA inadvertently leaks users’ email addresses
Let’s Encrypt, the non-profit Certificate Authority (CA) that helps website administrators switch from HTTP to HTTPS quickly and effortlessly, has accidentally leaked …

Developing Hashcat, a tool for advanced password recovery
As general-purpose computing on graphics processing units (GPGPU) became more viable around 2009, professional software developer Jens “atom” Steube wanted to …

Symantec will acquire Blue Coat for $4.65 billion
Symantec will acquire Blue Coat for approximately $4.65 billion in cash. The transaction has been approved by the Boards of Directors of both companies and is expected to …

Thousands of websites exploited for illegal SEO tactics
Imperva researchers discovered a long-running and still active illegal attack that has been exploiting vulnerabilities in thousands of legitimate websites to increase SEO …

How IT teams are preparing for the rise of intelligent machines
A new survey carried out by analyst firm Freeform Dynamics examines the attitudes and readiness of IT decision makers with regard to intelligent machines and business systems …

Week in review: Mitsubishi Outlander hack, Mozilla funds open source code audits
Here’s an overview of some of last week’s most interesting news and articles: Researchers hack the Mitsubishi Outlander SUV, shut off alarm remotely Mitsubishi …

Crysis ransomware fills vacuum left by TeslaCrypt
TeslaCrypt has reached the end of the road, and other ransomware is ready to fill the vacuum left behind it. A relative newcomer to the market, Crysis ransomware is already …

Mozilla will fund code audits for open source software
The Mozilla Foundation has set up the Secure Open Source (SOS) Fund, whose aim is to help open source software projects get rid their code of vulnerabilities. “The Fund …

BEC scams: What you need to know
Ransomware attacks hitting businesses and institutions might be the latest trend, but they are just one of the threats these organizations have to protect themselves against. …

Hypervisor wiretap feature can leak data from the cloud
Bitdefender has discovered that encrypted communications can be decrypted in real-time using a technique that has virtually zero footprint and is invisible to anyone except …

Will your cyber insurance pay for email attacks?
If you’re relying on cyber insurance, check if your policies are up-to-date in covering new social engineering email attacks that are leaving firms at risk for taking …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations