Zeljka Zorz
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105959/world-400x200.jpg)
EternalBlue vulnerability scanner statistics reveal there are exposed hosts worldwide
After the recent massive WannaCry ransomware campaign, Elad Erez, Director of Innovation at Imperva, was shocked at the number of systems that still sported the Microsoft …
![Katyusha](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103656/katyusha-400x200.jpg)
Telegram-based Katyusha SQL injection scanner sold on hacker forums
Despite regularly achieving one of the top spots on the OWASP Top 10 list of the most critical web application security risks, injection vulnerabilities continue to plague …
![payment card](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113353/payment-card-400x200.jpg)
How Magecart attackers monetize stolen payment card info
The Magecart campaign, aimed at compromising online shops with malicious JavaScript code to collects payment card info, is still going strong, and researchers have pinpointed …
![100](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103658/100-400x200.jpg)
Constant availability: Mission-critical business data challenges
In today’s world, consumers expect businesses to be always-on, but 24/7/365 availability – for both data and applications – comes with specific information …
![Trojan](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104913/trojan_horse-400x200.jpg)
Swiss users targeted with Windows, macOS banking Trojan
Swiss users are once again hit with emails delivering banking malware, for both Windows and macOS systems. Trend Micro researchers believe the campaign to have been mounted by …
![food kiosk](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103717/food_kiosk-400x200.jpg)
PoS malware hits food kiosks, steals payment card info
PoS malware can lurk in the most unexpected of places, and some have recently been found in the payment kiosks by US-based vendor Avanti, stealing payment card information. …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104216/phishing-400x200.jpg)
Man stole bitcoin by phishing individuals on the dark web
Michael Richo, a 35-year-old from Connecticut, had the brilliant idea of stealing bitcoin from people involved in illegal deals through dark web marketplaces. Perhaps he …
![earth](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111449/earthspace-400x200.jpg)
Satellite phone communications can be decrypted in near real-time
Satellite phone communications encrypted with the GMR-2 cipher can be decrypted in mere fractions of a second, two Chinese researchers have proved. The vulnerable cipher The …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104053/person-400x200.jpg)
Operators of decade-old Malware-as-a-Service outfit charged
As Crackas With Attitude hacker “Incursio” got handed a 2-year prison sentence for gaining unauthorized access to government computers and online accounts of a …
![Book](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103732/featured-adv_per_sec-400x200.jpg)
Review: Advanced Persistent Security
About the authors Ira Winkler, CISSP is President of the Internet Security Advisors Group. He is considered one of the world’s most influential security professionals. Araceli …
![bitcoin](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103735/bitcoin-400x200.jpg)
South Korean bitcoin exchange hacked, user accounts plundered
Bithumb, a South Korean bitcoin and ether exchange, has suffered a data breach that resulted in customer losses potentially reaching billions of South Korean won (currently, a …
![Windows 10](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111848/windows10-preso-400x200.jpg)
Windows 10 will use protected folders to thwart crypto ransomware
Windows 10 Fall Creators Update (the next major update of Microsoft’s popular OS) is scheduled to be released in September, and will come with major new end-to-end …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality