Zeljka Zorz
A deadly campaign delivers Pony info-stealer followed by Cryptowall ransomware
After the tech support scam paired with ransomware, another deadly combination has been seen targeting PC users: info-stealer coupled with ransomware. According to Heimdal …
High-impact DoS flaw patched in Node.js, update as soon as possible
The Node.js Foundation has pushed out a patch for its eponymous open source, cross-platform runtime environment for developing server-side web applications. The fix plugs two …
A double whammy of tech support scam and ransomware hits US, UK users
Tech support scams and ransomware usually don’t go together, but there’s a first time for everything. Symantec researchers have spotted a generic tech support scam …
Elasticsearch servers actively targeted by botmasters
Elasticsearch is one of the most popular choices when it comes to enterprise search engines.Unfortunately, a couple of remote code execution flaws (CVE-2015-5377, …
3G/4G cellular USB modems are full of critical security flaws, many 0-days
An analysis of popular 3G and 4G cellural USB modems and routers used around the world revealed a myriad of serious vulnerabilities in each of them.The SCADA Strange Love team …
Darkode forum returns with lousy security that keeps serious users away
The newest version of the infamous Darkode cybercriminal forum is up, and it’s the worst one ever, says Loucif Kharouni, a senior threat researcher with Damballa.As you …
Flaws in medical data management system can be exploited to modify patient information
Two vulnerabilities found in v3.3 of Epiphany’s Cardio Server ECG Management System, a popular system that is used to centralize and manage patient data by healthcare …
How Europol analyzes malware
In the wake of the takedown of a major cybercriminal group wielding banking Trojans in Ukraine in June this year, Europol noted that it “provided crucial support to the …
Belkin’s N150 router sports multiple flaws, including default access credentials for telnet server
Belkin’s SOHO routers are not exactly a paragon of a secure device, so it shouldn’t come as a surprise that, once again, a security researcher has unearthed a …
Windows machines stop trusting Dell’s two unconstrained root CA certs
Microsoft has updated the Certificate Trust list for all supported releases of Microsoft Windows so that the two digital certificates (complete with inadvertently disclosed …
Hacktivists and cyber extortionists hit Greek, Russian, UAE banks
A number of “regular” and central banks across Europe, Russia and Asia have been targeted by cyber attackers.Last week, in the wake of Turkey downing a Russian …
VTech data breach gets worse: Children’s pictures and chat logs were also compromised
The hacker who breached VTech’s customer database and shared with the world the fact that the exploit was so easy anyone could do it (SQL injection), has found …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)