
Over 3 million servers running outdated JBoss software open to attack
Spurred by the recent discovery that the Samas (aka SamSam) ransomware is being spread via compromised servers running out-of-date versions of Red Hat’s JBoss server …

Chrome Web Store developers have to improve user data transparency
Google has announced that it’s modifying the User Data Policy for the Chrome Web Store, and developers have three months to make the needed changes if they don’t …

US government is lousy at cybersecurity
SecurityScorecard released its 2016 Government Cybersecurity Report, a comprehensive analysis that exposes alarming cybersecurity vulnerabilities across 600 local, state, and …

Hacking Team hacker explains how he did it
Some nine moths ago, a hacker that calls himself Phineas Fisher managed to breach the systems and networks of Hacking Team, the (in)famous Italian company that provides …

Week in review: The inconvenient truth about API security, and the perfect exfiltration technique
Here’s an overview of some of last week’s most interesting news and articles: Uninstall QuickTime for Windows today! Trend Micro’s Zero Day Initiative has released …

Short URLs plus cloud services equal bad security
Short URLs are great when they lead to public websites, and documents and files that aren’t meant to remain private, but you should think twice about using them to lead …

VMware plugs critical information-leaking hole
VMware has plugged a critical security issue in the VMware Client Integration Plugin, which could allow for a Man in the Middle attack or web session hijacking in case the …

Microsoft sues US govt for right to tell users when their data is accessed by feds
Microsoft has filed a new lawsuit against the US government, asking the court to permit them to alert their users when their online accounts and the data in them has been …

Uninstall QuickTime for Windows today!
The time has come to deinstall QuickTime from your Windows machine. Trend Micro’s Zero Day Initiative has just released advisories (ZDI-16-241 and ZDI-16-242) detailing …

The rise of threat hunting
85 percent of enterprises have already adopted some form of threat hunting to aggressively track and eliminate cyber adversaries as early as possible. This proactive model …

EU approves new data protection rules
Members of the European Parliament have given their final approval for the new General Data Protection Regulation (GDPR). Parliament’s vote ends more than four years of work …

Trust is the key to cloud adoption
Intel Security released a global report advocating the need for technology vendors to help businesses, governments and consumers understand the implications surrounding …
Featured news
Resources
Don't miss
- Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted