Personal information of BART police officers published by hackers
Following the disruption of cell phone service by the operators of the Bay Area Rapid Transit system (BART) that foiled a planned protest regarding the death of a man shot by …
Mass injection attack compromised 20,000+ domains, delivers fake AV
A simple mistake on the part of cyber attackers has revealed another mass malicious iFrames injection attack that is currently under way, say Armorize’s researchers. …
“Uniform traffic ticket” spam leads to malware
A massive spam campaign taking the form of an email notifying the recipients of a bogus traffic ticket has been detected by a number of security companies. The email in …
Craigslist phishers warn about phishing
Scammers are targeting Craigslist users again – this time with a phishing page that tries to trick users into believing it’s legitimate by containing a warning …
RSA proactively blocks malware threats
RSA announced updates to its CyberCrime Intelligence Service designed to help enterprises monitor and harden their infrastructure against malware infection and data loss. This …
RealPlayer multiple vulnerabilities
Some vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user’s system, according to Secunia. 1. A …
Human Compromise: The Art of Social Engineering
This book teaches you the “how-to” of social engineering. Taking a hands-on approach, you will learn everything from the field-tested methods for reading body …
StealthWatch 6.1 adds internal and external monitoring capabilities
Lancope released a new version of its monitoring platform, the StealthWatch System 6.1. This version increases both the amount and types of flow data that can be processed by …
Integrated content-aware SIEM and firewall
NitroSecurity and Palo Alto Networks have integrated content-aware SIEM and next-generation firewall technology into a complete enterprise security solution designed to …
Researchers identify first flaws in the Advanced Encryption Standard
Researchers have found a weakness in the AES algorithm. They managed to come up with a clever new attack that can recover the secret key four times easier than anticipated by …
PoC keylogger app for smartphones revealed
We are all familiar with keyloggers – software that registers and identifies the keys pressed by a computer user – and its prevalently malicious uses. One of the …
Your name as a Google AdWord
It used to be that advertisers were forbidden from using proper names as Google AdWords, but not anymore. Forbes writer Kashmir Hill discovered that while searching her own …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware