Zeljka Zorz
Google warns of actively exploited Windows zero-day
Google has disclosed to the public the existence of a Windows zero-day vulnerability (CVE-2016-7255) that is being actively exploited in the wild. According to Neel Mehta and …
Services disrupted at three UK hospitals due to virus attack
Computer systems of the Northern Lincolnshire and Goole NHS Foundation Trust have been hit by a “virus”, and the HNS Trust reacted by shutting down the majority of …
Can we extinguish the Mirai threat?
The recent massive DDoS attack against DNS provider Dyn has jolted (some of) the general public and legislators, and has opened their eyes to the danger of insecure IoT …
Espionage group uses cybersecurity conference invite as a lure
A cyber espionage group that has been targeting organizations in Southeast Asia for years is misusing a legitimate conference invite as a phishing lure to trigger the download …
Most unpatched Joomla sites compromised in latest wave of attacks
If you run a Joomla-based website and you haven’t implemented the latest security release of the CMS, your site has been almost surely compromised. According to Sucuri …
Australian blood donors’ info found leaking from insecure server
Personal information of some 550,000 Australian blood donors has been sitting exposed on a web developer’s server and has been downloaded by a person who effectively …
New code injection attack works on all Windows versions
Researchers from security outfit enSilo have uncovered a new code injection technique that can be leveraged against all Windows versions without triggering current security …
Phishers are impersonating major UK banks on Twitter
Customers of UK banks are being targeted by phishers impersonating the banks’ customer support account on Twitter, Proofpoint warns. The phishers usually choose a …
Icarus takes control of drones by impersonating their operators
Researcher Jonathan Andersson, a member of Trend Micro’s TippingPoint DVLabs, has demonstrated how a specialized hardware module dubbed Icarus can be used to hijack a …
Dyn DDoS attack post-mortem: Users inadvertently helped
As StarHub, one of the three major telcos in Singapore, confirmed that they were the latest victim of “intentional and likely malicious distributed denial-of-service …
Malicious JPEGs can compromise your iPhone
A vulnerability in the iOS CoreGraphics component allows attackers to compromise iDevices by tricking victims into viewing a maliciously crafted JPEG file. The good news is …
Dyn DDoS attack: The aftermath
On October 21, New Hampshire-based Internet performance management company Dyn suffered the largest DDoS attack ever to be registered. The attacks – there were three, in …
Featured news
Resources
Don't miss
- The tech that turns supply chains from brittle to unbreakable
- Strix: Open-source AI agents for penetration testing
- Product showcase: SecAlerts – Relevant, actionable, up-to-the-minute vulnerability alerts
- The year ahead in cyber: What’s next for cybersecurity in 2026
- Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims