Zeljka Zorz
Let no endpoint go dark
The compromise of a single enterprise endpoint can ultimately lead to a wider security incident, ransomware outbreak, data breach, costly remediation and rebuilding of lost …
Attackers disrupt plant operations with ICS-tailored malware
Security researchers from FireEye and Dragos have analyzed and detailed a new piece of malware targeting industrial control systems (ICS). Dubbed “TRITON” and …
Security company Fox-IT reveals, details MitM attack they suffered in September
Dutch IT security consultancy/service provider Fox-IT has revealed on Thursday that it has suffered a security breach, which resulted in some files and emails sent by the …
US man is behind the 2015 Hacking Team hack?
Who’s behind the 2015 Hacking Team hack? According to a notice received by Guido Landi, one of the former Hacking Team employees that was under investigation for the …
1.4 billion unencrypted credentials found in interactive database on the dark web
A data dump containing over 1.4 billion email addresses and clear text credentials is offered for download in an underground community forum. What’s so special about …
MoneyTaker’s stealthy hacking spree spread from US to Russia
A stealthy group of Russian-speaking hackers has been targeting financial organizations (banks, credit unions, lenders) in the US and Russia, stealing money and documentation …
Keylogger found in Synaptics driver on HP laptops
For the second time this year, a security researcher unearthed a keylogger in a driver used on a number of HP laptops. The first time was earlier this year, when Swiss …
Android vulnerability allows attackers to modify apps without affecting their signatures
Among the many Android vulnerabilities patched by Google this December is one that allows attackers to modify apps without affecting their signatures. The danger …
Bitcoin traders beware: Fake trading bot offer delivers RAT
As the price of Bitcoin keeps hitting surprising heights, more and more cyber crooks are turning their sights on anything and anyone who trades or uses the popular …
Chrome site isolation option offers more security
Chrome 63, which was promoted to the stable release channel on Wednesday, comes with many security fixes and improvements, especially for the enterprise audience. Site …
Apple users, it’s time for new security updates
Apple usually pushes out security updates for its various devices and software on the same day, but not this time. The iOS update was rushed out on Saturday because of a …
NiceHash suffers security breach, around $70 million in Bitcoin stolen
NiceHash, one of the most popular crypto-mining marketplaces, has apparently suffered a breach that resulted in the theft of the entire contents of the NiceHash Bitcoin …
Featured news
Sponsored
Don't miss
- Black Friday shoppers targeted with thousands of fraudulent online stores
- RomCom hackers chained Firefox and Windows zero-days to deliver backdoor
- How to recognize employment fraud before it becomes a security issue
- Practical strategies to build an inclusive culture in cybersecurity
- Domain security posture of Forbes Global 2000 companies