Zeljka Zorz
Macro-based malware continues to gain traction
After having “rediscovered” the usefulness of MS Office macros, malware peddlers have been ramping up email spam runs delivering documents that request users to …
Half of all Android devices vulnerable to installer hijacking attacks
A critical Android vulnerability that has been discovered over a year ago and responsibly disclosed to Google and other Android manufacturers can be exploited by attackers to …
Premera breach: Are HIPAA standards too low?
Here’s an interesting twist regarding the Premera data breach revealed last week: the company has been deemed compliant with the Health Insurance Portability and …
Old Adobe Flex SDK bug still threatens users of many high-profile sites
An old vulnerability affecting old releases of the Adobe Flex SDK compiler can be exploited to compromise user data of visitors to many popular sites, including three of most …
Full, cracked version of NanoCore RAT leaked, onslaught of infection attempts expected
NanoCore, a lesser-known remote access Trojan (RAT), has recently been spotted being delivered to employees of energy companies in Asia and the Middle East via spear-phishing …
Twitch forces users to reset password in wake of breach
Twitch, the popular Amazon-owned game streaming service, has apparently suffered a breach that might have resulted in the compromise of users’ personal information and …
UK consumers committed to mobile privacy
Spurred by high-profile data breaches, Edward Snowden’s revelations, and by the growing awareness that their smartphones hold a lot of sensitive data, most UK users have …
Fake “Incoming Fax Report” emails lead to crypto-ransomware
Once again, fake “Incoming Fax Report” emails carrying malware are being sent out to random users. Given the popularity of online fax-sending services, there are …
Flaw in Hilton Honors website left all customer accounts wide open
The discovery of a vulnerability in the Hilton HHonors website that could lead to account hijacking and information theft has put a temporary stop to Hilton Hotels & …
New PoS malware family comes with keylogger component
A new piece of PoS scraper malware has been found and analyzed by researchers from Cisco’s Talos Security Intelligence and Research Group. Dubbed “PoSeidon,” …
Cisco Small Business IP phones vulnerable to eavesdropping
Cisco has confirmed the existence of a flaw affecting its Small Business SPA 300 and 500 series IP phones that can be exploited by attackers to listen to the audio stream of …
Scammers use Whatsapp calling feature as a lure
Survey scammers and adware peddlers continue to advantage of the interest Whatsapp users have in the quietly rolled out Free Voice Calling feature. According to …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader