Zeljka Zorz

Adobe patches Flash 0day exploited in attacks
The Adobe Flash Player update announced earlier this week is here, and it fixes more than just the zero-day flaw exploited in attacks in the wild. All in all, the latest …

Pawn Storm APT targets members of Angela Merkel’s party
Pawn Storm, one of the oldest APTs engaging in cyber espionage, has been spotted targeting members of the German Christian Democratic Union (CDU), the political party of …

Mozilla fights in court to get info about potential Firefox flaw
Mozilla has asked a Washington State District Court to compel FBI investigators to provide details about a vulnerability in the Tor Browser with them before they share it with …

Facebook CTF platform is now open source
Capture the Flag competitions are a good – not to mention legal – way for hackers to build and hone their skills. But, quality CTF environments are difficult and …

Germany set to end copyright liability for open Wi-Fi operators
People who travel to Germany are often surprised at the lack of public, open Wi-Fi networks. That’s because German law (Störerhaftung – “liability of …

SAP vulnerability exploited to compromise enterprises worldwide
A SAP vulnerability, patched over five years ago, is being leveraged to exploit SAP systems of many large-scale global enterprises, US-CERT warns. At least 36 organizations in …

CryptXXX 2.0 foils decryption tool, locks PCs
CryptXXX ransomware, first spotted in mid-April, has reached version 2.0, and a new level of nastiness. It’s also on its way to become one of the top ransomware families …

0day alert: Be ready to update Adobe Flash Player tomorrow
On Tuesday, Adobe has pushed out security updates for Cold Fusion and Adobe Acrobat and Reader, but has also announced an update for Flash Player that should be released on …

Attackers keep flinging assorted ImageMagick 0day exploits
It’s been a week since the existence of several flaws affecting popular image processing library ImageMagick have been made public. At the time, one of these, a remote …

How secure are the devices connecting to enterprise assets?
Most enterprises have accepted that its employees will use their own various, often mobile devices to access company assets, and have realized that the defined, more easily …

Viking Horde botnet malware lurks on Google Play
Five apps on Google Play carry Viking Horde, a new malware family that ropes Android devices into an ad-clicking botnet, but can also make them send out spam, send SMS …

DARPA calls for help to improve cyber attack attribution
Reliable cyber attack attribution is currently almost impossible, and the Defense Advanced Research Projects Agency (DARPA) wants to find a solution for that problem. To that …
Featured news
Resources
Don't miss
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse
- Train smarter, respond faster: Close the skill gaps in your SOC