Please turn on your JavaScript for this page to function normally.
Chinese APTs use commercial VPN to hide their attack activity

A number of APT actors believed to be of Chinese origin are using a commercial VPN service to anonymize and obfuscate their attack activity.Dubbed Terracotta, the VPN service …

Attackers are downing DNS servers by exploiting BIND bug

As predicted, the critical and easily exploitable flaw that affects all versions of BIND, the most widely used DNS software on the Internet, has started being exploited by …

Malvertisers abused Yahoos ad network for days

“A large-scale malvertising attack abusing Yahoos ad network has been hitting visitors of the Internet giant’s many popular and heavy-traffic sites for nearly a …

Hackers actively exploiting OS X zero-day to root machines, deliver adware

“Attackers are actively exploiting a zero-day privilege escalation vulnerability affecting the latest version of Apple’s OS. The bug’s existence has been …

Macs can be permanently compromised via firmware worm

“Security researchers Xeno Kovah and Trammell Hudson have discovered several flaws in the firmware installed on Apple computers, and have created a worm that can …

Chrome extensions easily disabled without user interaction

Independent researcher Mathias Karlsson has discovered a vulnerability that can be exploited to disable Chrome extensions without user interaction.Apparently, the bug has …

Health records of 5.5 million US patients accessed in MIE breach

The Indiana Attorney General’s Office has launched an investigating into the recent breach suffered by Medical Informatics Engineering (MIE) and its subsidiary …

Hacker steals Bitdefender customer info, blackmails company

A hacker has managed to access a database containing usernames and passwords of customers of Romanian AV maker Bitdefender, and has tried to blackmail the company into paying …

Hospitals advised to stop using vulnerable computerized drug pumps

The US Food and Drug Administration has issued a safety communication warning healthcare facilities using the Hospira Symbiq Infusion System – a computerized pump made …

Fake “Windows 10 Free Upgrade” emails deliver ransomware

“It didn’t take long for malware peddlers to take advantage of the huge interest users have shown into Windows 10. The newest version of the popular software was …

US will revise Wassenaar pact changes

US Commerce Department’s Bureau of Industry and Security (BIS) will rethink the Wassenaar pact changes regarding “cybersecurity items” that it proposed and made …

Researchers devise passive attacks for identifying Tor hidden services

A group of MIT researchers have devised two attacks that could identify, with a high degree of certainty (88%), an anonymous hidden service or client.Hidden services are …

Don't miss

Cybersecurity news