Zeljka Zorz
Former journalist faces 25 years in prison for article defacement
Matthew Keys, a former Reuters social media editor, has been found guilty of computer hacking, and could be sentenced to spend as many as 25 years in prison.Keys was indicted …
Hackers breach firm whose tech is used in Samsung Pay
It was revealed on Wednesday by the New York Times that LoopPay, a US-based Samsung subsidiary whose technology is central to the Samsung Pay mobile payment system, has …
Pen-testing drone searches for unsecured devices
You’re sitting in an office, and you send a print job to the main office printer. You see or hear a drone flying outside your window. Next thing you know, the printer …
Free tool to remove YiSpecter iOS malware
“Zimperium has released a tool to help iOS users that have been infected with the recently spotted YiSpecter advertising malware remove the threat from their devices. …
Huawei 3G routers rife with flaws
South Korean security researcher Pierre Kim has revealed today that fifteen Huawei 3G routers have a slew of serious vulnerabilities – RCE, XSS, CSRF, DoS, …
Amazon launches AWS web application firewall
A new option has been offered to Amazon Web Services customers who want to increase the security of their servers: AWS WAF. This web application firewall aims to stop random …
Previously unknown Moker RAT is the latest APT threat
“Researchers over at cybersecurity company enSilo have discovered a novel, powerful and persistent type of malware plaguing the network of one of their customers. This …
IP camera manufacturers force researcher to pull conference talk
A researcher has been forced to cancel his presentation on the vulnerabilities found on major surveillance cameras and how they can be exploited “due to legal threats …
Google patches Stagefright 2.0 on Nexus devices
Google has released its monthly security update for Nexus devices. Among the issues this update fixes are the two vulnerabilities in the stagefright and utils Android …
Attackers take over org’s OWA server, harvest domain credentials with malicious DLL
Researchers from cyber attack detection and response outfit Cybereason have discovered a novel APT technique that was used by attackers to gain persistence in an (unnamed) …
T-Mobile customer data stolen from Experian already for sale
The personal info of 15 million T-Mobile USA customers stolen in the recently revealed Experian breach is possibly being already sold on the Dark Web.Irish fraud prevention …
Cisco disrupts major ransomware campaign that brought in $30M annually
“Cisco researchers, with the help of Level 3 Threat Research Labs and OpenDNS, have managed to strike a considerable blow against ransomware peddlers that used the …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)