NVIDIA and Android forums hacked, user credentials stolen
Following the high-profile breach of one of Yahoo’s subdomain servers and the resulting leak of over 450,000 passwords stored in clear text in one of the exfiltrated …
Big brands utilized in malware distribution
Commtouch security analysts have seen substantial continued blending of big brand names with malware. Researchers named the following top seven brands that were abused in …
Majority of small businesses not confident in network security
More than half of IT administrators at small businesses would not bet their own money that all of the computers their business owns and employees use are free of malware (51%) …
VKernel announces integration support with Microsoft System Center 2012
VKernel released the integration compatibility between its vOPS Server product line and Microsoft System Center 2012. This integration adds capabilities to Microsoft System …
The use of exploit kits changed spam runs
Spammers used to depend on email recipients to tie the noose around their own necks by inputing their personal and financial information in credible spoofs of legitimate …
DarkComet RAT used by wide array of attackers
Remote administration software such as the DarkComet RAT has many legal uses but it is unfortunately more known for being frequently misused by a wide array of cyber …
Instagram “Friendship Vulnerability” patched
A flaw in the popular Instagram app that allows potential snoopers to add themselves as friends of any Instagram user and, consequently, to access his or hers private …
Nearly half a million Yahoo passwords leaked following hack
Some 450,000 email addresses and associated unencrypted passwords have been dumped online by the hacking collective “D33Ds Company” following the compromise of a …
GFI Software launches cloud security and networking platform
GFI Software announced GFI Cloud, a platform for the delivery of cloud services via a Web-based user interface, accessible from anywhere with an Internet connection. …
Top skills for IT asset management leaders
The evolving and growing role of IT asset management (ITAM) is driving both increased demand for existing skills and a new requirement for augmented financial, commercial and …
Major pitfalls involving vulnerability scanners
While 92 percent of companies have a vulnerability management program in place, nearly half consider their networks to range from “somewhat” to …
Reverse Deception: Organized Cyber Threat Counter-Exploitation
Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify APTs, categorize them according to risk level, and prioritize your actions accordingly …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)