Zeljka Zorz
Vonteera adware blocks AVs, can install uninstallable Chrome extensions
The Vonteera adware family has been around for quite some time, but it is now slowly starting to cross the line between unwanted, potentially malicious software to outright …
Credential manager system used by Cisco, IBM, F5 has been breached
Pearson VUE, a provider of computer-based assessment testing for regulatory and certification boards, has announced that its Credential Manager system (PMC) has been …
Zero detection GlassRAT operated undetected for years
RSA Research has unearthed another Remote Access Tool/Trojan (RAT) used in cyber espionage campaigns. Dubbed GlassRAT, it has the usual capabilities of this type of malware: …
Dell shipped computers with root CA cert, private crypto key included
All desktop and laptops shipped by Dell since August 2015 contain a root CA certificate (eDellRoot) complete with the private cryptographic key for it, opening users to the …
Analytics services are tracking users via Chrome extensions
It’s quite possible that, despite your belief that the Google Chrome is the safest browser there is and your use of extensions that prevent tracking, your online …
How malware peddlers trick users into enabling Office macros
A week ago, SANS ISC handler and freelance security consultant Xavier Mertens analyzed a Word document containing malicious macros, and unearthed in it a VBA function that …
New law allows French police to seize and search electronic devices without a warrant
In the wake of the Paris attacks, the French Senate passed on Friday a bill that extends the state of emergency declared after the attacks to three months.The bill expands …
PoS malware hit 54 Starwood luxury hotels
Starwood Hotels & Resorts, the international hotel chain that owns and operates hotels under the Westin, Sheraton, W Hotels, St. Regis, and Le Méridien brands, has …
ISIS operation security guide gives insight into group’s cybersecurity practices
Do ISIS terrorists use encryption, and if so, what tools do they favour?The Combating Terrorism Centre (CTC), an academic institution at the US Military Academy in West Point, …
Android adware tricks users into giving it power to secretly download other apps
Earlier this month Lookout revealed the existence of three adware families – Shuanet, ShiftyBug and Shedun – that secretly root Android devices and are extremely …
New Dyre variant can target Windows 10 and Microsoft Edge users
As Microsoft continues to push Windows users towards adopting the latest version of the popular OS, malware authors have started adding support for it. Heimdal Security …
PwnBin: A script for scraping Pastebin for leaked API keys, SSH credentials
Pastebins, apart from being a great help for programmers as they offer a place where one can store text online for a set period of time and share it with others, are also …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility