Collection of security checks for Linux
Buck Security is a collection of security checks for Linux. It was designed for Debian and Ubuntu servers, but can be useful for any Linux system. The aim of Buck Security is, …
Introducing the Cyber Defence conference
Cyber warfare has become a major concern for international governments, military and civil agencies over the past few years. A recent wave of cyber attacks against NATO member …
Week in review: Compromised hardware, AV failures and published IE 0-day exploit
Here’s an overview of some of last week’s most interesting news, articles and interviews: Zuckerberg hacked into journalists’ email? The Facebook co-founder …
The threat landscape is changing, AV fails to adjust
A recent testing conducted by NSS Labs presented us with some deplorable results: of the seven antivirus products tested two weeks after the IE bug used for breaching Google …
Apple Safari 4.0.5 patches critical vulnerabilities
Safari 4.0.5 includes improvements to performance, stability, and security. ColorSync An integer overflow that could result in a heap buffer overflow exists in the handling of …
Playstation emulator installs malware
Playing again the games you used to amuse yourself with for hours some years ago could bring a smile to your face, but it could also get your computer infected. Searching for …
PeerSec MatrixSSL: Embedded SSL and TLS implementation
MatrixSSL is an embedded SSL implementation designed for small footprint applications and devices. It allows secure management of remote devices. PeerSec Networks offers a …
Exploit for IE 0-day flaw published, patch still unavailable
An Israeli hacker has created an exploit for the IE zero-day flaw that Microsoft warned about on Tuesday, and the code is already being inserted into the Metasploit Framework. …
New Federal IT security certification program
A new certification program specifically designed and tailored to help secure the nation’s Federal information technology systems was unveiled today. The certification …
Targeted attacks exploiting PDF bugs are soaring
Adobe is having a hard time fighting its bad reputation when it comes to products riddled with vulnerabilities. Adobe Reader exploits seem the weapon of choice of many a cyber …
Koobface worm doubles its number of command and control servers
The shut down and recovery of the Troyak-as command and control center (C&C) for the active Zeus botnet was good news for the whole IT security community. Unfortunately, …
File sharing networks open door to identity theft
According to the Washington Post, in any given second, nearly 22 million people around the globe are on peer-to-peer file-sharing networks downloading and swapping movies, …
Featured news
Resources
Don't miss
- Attackers are exploiting auth bypass vulnerability on FortiGate firewalls (CVE-2025-59718)
- Why vulnerability reports stall inside shared hosting companies
- Zabbix: Open-source IT and OT observability solution
- How exposure management changes cyber defense
- European police busts Ukraine scam call centers