Please turn on your JavaScript for this page to function normally.
Critical bug found in Cisco ASA products, attackers are scanning for affected devices

Several Cisco Adaptive Security Appliance (ASA) products – appliances, firewalls, switches, routers, and security modules – have been found sporting a flaw that …

Fire
Exposing the Adwind RAT: One of the biggest malware platforms in existence today

At the end of 2015, Kaspersky Lab researchers became aware of an unusual malware program that had been discovered during an attempted targeted attack against a bank in …

money
Government sector: largest revenue contributor for the global cyber security market

The cyber security market is predicted to reach close to USD 161 billion in revenue by 2020, according to Technavio. “During the forecast period, the market share of North …

IRS
101,000 US taxpayers affected by automated attack on IRS app

The US Internal Revenue Service (IRS) has revealed more details about an attack it suffered last month, mounted by unknown individuals with the aim to file fraudulent tax …

Gmail
Gmail to warn when email comms are not encrypted

From now on, Gmail users will be able to see whether their communications with other email account holders – whether Gmail or any other email service – is secured. …

Broken glass
Flaw in Sparkle Updater for Mac opens users of popular apps to system compromise

A security engineer has recently discovered a serious vulnerability in Sparkle, the widely used open source software update framework for Mac applications, that could be …

Hearthstone
Playing Hearthstone? Want to cheat? You might end up with Bitcoin-stealing malware

It’s widely known that online gamers make great targets for cyber criminals: their dedication and enthusiasm for the game(s) often leads them to disregard warnings both …

money
What’s the real cost of a security breach?

The majority of business decision makers admit that their organisation will suffer an information security breach and that the cost of recovery could start from around $1 …

Connect
Network forensic analysis tool NetworkMiner 2.0 released

NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any …

Money
Russian hackers used malware to manipulate the Dollar/Ruble exchange rate

Russian-language hackers have managed to break into Russian regional bank Energobank, infect its systems, and gain unsanctioned access to its trading system terminals, which …

Java
Oracle pushes out emergency fix for Java SE

Oracle has patched a vulnerability (CVE-2016-0603) in Java SE (Standard Edition) 6, 7 or 8 on the Windows platform, which could be exploited by attackers looking for ways to …

Department of Justice
Info on 20,000 FBI and 9,000 DHS employees leaked following alleged DoJ hack

On Sunday, Motherboard reported that a hacker contacted them and claimed to have hacked into a US Department of Justice (DoJ) computer, exfiltrated 200GB of files, as well as …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools