Zeljka Zorz
Critical bug found in Cisco ASA products, attackers are scanning for affected devices
Several Cisco Adaptive Security Appliance (ASA) products – appliances, firewalls, switches, routers, and security modules – have been found sporting a flaw that …
101,000 US taxpayers affected by automated attack on IRS app
The US Internal Revenue Service (IRS) has revealed more details about an attack it suffered last month, mounted by unknown individuals with the aim to file fraudulent tax …
Gmail to warn when email comms are not encrypted
From now on, Gmail users will be able to see whether their communications with other email account holders – whether Gmail or any other email service – is secured. …
Flaw in Sparkle Updater for Mac opens users of popular apps to system compromise
A security engineer has recently discovered a serious vulnerability in Sparkle, the widely used open source software update framework for Mac applications, that could be …
Playing Hearthstone? Want to cheat? You might end up with Bitcoin-stealing malware
It’s widely known that online gamers make great targets for cyber criminals: their dedication and enthusiasm for the game(s) often leads them to disregard warnings both …
Russian hackers used malware to manipulate the Dollar/Ruble exchange rate
Russian-language hackers have managed to break into Russian regional bank Energobank, infect its systems, and gain unsanctioned access to its trading system terminals, which …
Oracle pushes out emergency fix for Java SE
Oracle has patched a vulnerability (CVE-2016-0603) in Java SE (Standard Edition) 6, 7 or 8 on the Windows platform, which could be exploited by attackers looking for ways to …
Info on 20,000 FBI and 9,000 DHS employees leaked following alleged DoJ hack
On Sunday, Motherboard reported that a hacker contacted them and claimed to have hacked into a US Department of Justice (DoJ) computer, exfiltrated 200GB of files, as well as …
Dyre gang taken down by Russian authorities
Dyre (aka Dyreza), one of the most widespread and effective financial Trojans to crop up in the last few years, is currently not an active threat. In fact, spam campaigns …
Loanbase hacked via WordPress hole, funds stolen
Popular international Bitcoin crowd-lending platform Loanbase has suffered a security breach, and is currently offline. The breach was discovered on Saturday and made public …
T9000 backdoor steals documents, records Skype conversations, victims’ actions
A new backdoor Trojan with spyware capabilities is being used in targeted attacks against organizations based in the United States. It has been dubbed T9000, since it’s …
Twitter suspended 125,000 terrorism-related accounts
Since mid-2015, Twitter has suspended over 125,000 accounts “for threatening or promoting terrorist acts.” Most of these were related to ISIS. “We condemn …
Featured news
Resources
Don't miss
- Researcher drops two more Microsoft Defender zero-days, all three now exploited in the wild
- Workplace stress in 2026 is still worse than before the pandemic
- NIST admits defeat on NVD backlog, will enrich only highest-risk CVEs going forward
- Anthropic releases Claude Opus 4.7 with automated cybersecurity safeguards
- Cargo theft malware actor spent a month inside a decoy network before researchers pulled the plug