Zeljka Zorz
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113844/attacks-400x200.jpg)
Researchers bypass ASLR protection with simple JavaScript code
A group of researchers from the Systems and Network Security Group at VU Amsterdam have discovered a way to bypass address space layout randomization (ASLR) protections of …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113648/apple-400x200.jpg)
XAgentOSX Mac malware linked to Russian hacking group
Researchers have discovered and analyzed a new piece of Mac malware that is believed to be used by the Sofacy (aka Fancy Bear, aka Pawn Storm, aka APT28) hacking group. …
![signal app icons](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105045/signal-app-400x200.jpg)
Secure comms app Signal now offers encrypted video calls
Users of secure chat and voice call app Signal will soon be able to enjoy the option of encrypted video calls. For the moment, only calls between Signal users who have both …
![hourglass](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111605/hourglass-400x200.jpg)
Microsoft postpones Patch Tuesday
Patch Tuesday is the day when most system administrators sit down and perform critical patching of the systems under their control – or at least begin testing the …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105545/industry-400x200.jpg)
Researchers demonstrate ransomware for industrial control systems
We’ve witnessed ransomware targeting Windows and Linux systems and Macs, Android devices, smart TVs, and even a ransomware scheme targeting iPhone users (though not …
![find](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111025/find-horse-400x200.jpg)
Banks around the world targeted in watering hole attacks
The January attacks against Polish financial institutions through the booby-trapped site of the Polish Financial Supervision Authority are just one piece of a larger puzzle, …
![tunnel light](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111058/tunnel-light-400x200.jpg)
PacketTotal: Free online tool for analyzing packet captures
PacketTotal is a free tool for analyzing packet captures that has recently been offered to the infosec community. Available online, the tool is powered by a Python-based …
![Qualys](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105055/qualys-rsac2017-400x200.jpg)
Qualys at RSA Conference: Implementing innovation
There will be no lack of interesting content from Qualys at this year’s RSA Conference. Depending on you interests, you might want to make time for some of these talks …
![magnify look search](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111342/magnify-400x200.jpg)
The security impact of HTTPS interception in the wild
HTTPS deployment is on an upward trajectory, and this growth is accompanied by the increasing HTTPS interception and SSL inspection by enterprise-grade firewalls, web filters, …
![gap](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105311/gap-400x200.png)
UK sports retailer Sports Direct hacked
UK’s largest sports retail outlet Sports Direct has suffered a data breach in September 2016, when an attacker gained access to its staff portal, and through it to …
![Gmail](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105107/gmail-fire-400x200.jpg)
Simple Gmail spoofing leaves users open to targeted attacks
Gmail shows no warning as it delivers legitimate-looking spoofed emails seemingly coming from an existing Gmail.com address, even though they come from a non-Gmail server. …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111248/danger-2-400x200.jpg)
Banks around the world hit with fileless malware
Kaspersky Lab researchers have brought to light a series of attacks leveraged against 140+ banks and other businesses around the world. But what makes these attacks unusual is …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality