Zeljka Zorz
Cisco plugs hole in firewall devices that could lead to device hijacking
Cisco has released a firmware update that plugs a critical, easy-to-exploit vulnerability that could allow a remote attacker to take control of the company’s RV220W …
cPanel notifies customers of possible user database breach
cPanel, the firm behing the popular eponymous web hosting administration and control software, has suffered a breach over the weekend. According to a notice posted online and …
Centene Corp misplaces hard drives with sensitive info of 95,000 customers
US-based healthcare service provider Centene somehow managed to lose six hard drives containing sensitive data of some 95,000 customers. “Centene has determined the hard …
Beware of Facebook “Security System Page” scams
Facebook users have lately become targets of phishers who are not satisfied with stealing the users’ login information, but they want their security questions and …
A possible future for IoT security
There are many problems with Internet of Things devices, and security is one of the biggest ones. To serve as an example of this important issue, two researchers from …
Review: Automating Open Source Intelligence
Editors: Robert Layton and Paul Watters Pages: 222 Publisher: Syngress ISBN: 0128029161 Introduction You can discover a lot – too much, some believe – by digging …
Belgian bank Crelan loses €70 million to BEC scammers
Belgian bank Crelan has become a victim of fraudsters. According to a statement (in Dutch) published last week, the bank has lost over 70 million euros (around $75,8 million). …
Phishing email leads to data breach at University of Virginia
Personally identifiable and financial information of some 1,400 University of Virginia employees has been compromised by attackers in a breach that dates back to early …
Versatile Linux backdoor acts as downloader, spyware
Another Linux Trojan has been discovered by researchers, and this one is pretty versatile: it opens a backdoor into the infected device, can download and run additional …
SSH backdoor found in more Fortinet devices, exploit attempts spotted in the wild
In case you missed it, Fortinet announced last week that the recently discovered FortiOS SSH backdoor – or, as they call it, “a management authentication …
Magento plugs XSS holes that can lead to e-store hijacking, patch immediately!
Last week, Magento released a very important bundle of patches for their eponymous e-commerce platform that should be implemented as soon as possible. The bundle plugs a …
“Deliberately hidden” backdoor found on US government’s comms system
Researchers from Austrian infosec outfit SEC Consult have unearthed what they dubbed a “deliberately hidden backdoor account” in NX-1200, a network controller …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA