Zeljka Zorz
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
Magecart compromises Feedify to get to hundreds of e-commerce sites
Customer engagement service Feedify has been hit by Magecart attackers, who repeatedly modified a script that it serves to a few hundred websites to include payment card …
![Android apps](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104618/android-apps-400x200.jpg)
Scan reveals known open source vulnerabilities in popular Android apps
Widespread use of unpatched open source code in popular Android apps is causing significant security vulnerabilities, warns the non-profit American Consumer Institute Center …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101153/patch-400x200.jpg)
September 2018 Patch Tuesday: Microsoft fixes actively exploited zero-day
Microsoft’s September 2018 Patch Tuesday has brought fixes for a little over 60 security vulnerabilities, 17 of which are critical and one is being actively exploited in …
![circle](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100231/circle-400x200.jpg)
Cybersecurity as catalyst for greater adoption of agile development
Agile development increases the output of software development projects by using a faster, more iterative engineering process. This pace also allows rapid course correction, …
![Advantech WebAccess](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103306/advantech-webaccess-400x200.png)
Advantech WebAccess RCE flaw still exploitable, exploit code available
A vulnerability in Advantech WebAccess, a web browser-based software package for human-machine interfaces (HMI) and supervisory control and data acquisition (SCADA) systems, …
![British Airways](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100252/britishairways2-400x200.jpg)
British Airways breach was effected by Magecart attackers
The British Airways breach was the work of a well-known criminal group dubbed Magecart, which managed to put payment card skimming code on the company’s website, says …
![People](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104532/people-400x200.jpeg)
What can we do to reverse the cybersecurity skills shortage?
An ever widening cybersecurity skills gap is making comprehensive cyber security protection – based on a combination of the latest tools and internal expertise – …
![Verizon](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103653/verizon-400x200.jpg)
Verizon details breaches they were called in to investigate
If at all possible, organizations like to keep details of the breaches they suffered under wraps, mostly to safeguard their reputation and to minimize legal trouble. As …
![Tor browser](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112210/tor_browser-400x200.jpg)
Tor Browser 8 is out: What’s new?
Version 8 of Tor Browser, the multiplatform browser that routes traffic through the Tor anonymity network, has been released this week. About the Tor Browser and this latest …
![British Airways](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100255/britishairways1-400x200.jpg)
Financial info of 380,000 British Airways customers stolen in site, app breach
British Airways has suffered a data breach and has confirmed that personal and financial details of some 380,000 customers have been compromised. About the breach “From …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102007/cisco-400x200.jpg)
Cisco fixes a host of security holes, including latest Apache Struts flaw
Cisco has plugged a heap of security holes – three of which are critical – in a variety of its products. The critical flaws The flaws deemed critical are: A DoS …
![Schneider Electric Modicon M221](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100300/schneider_electric_modicon_M221-400x200.jpg)
Remotely exploitable flaw in Schneider Electric PLCs is a danger to OT networks
A vulnerability in the Schneider Electric Modicon M221, a programmable logic controller (PLC) deployed in commercial industrial facilities worldwide, can be exploited to …
Featured news
Sponsored
Don't miss
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality
- FIN7 sells improved EDR killer tool
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)