Zeljka Zorz
122 online forums compromised to redirect visitors to Fiesta exploit kit
Over a hundred forum websites have been compromised and injected with code that redirects users to sites hosting the Fiesta exploit kit, Cyphort researchers have found. These …
Scammers deliver malware via fake Steam game pages
Aside from being regularly targeted with phishing scams, fake giveaways leading to online surveys, and having malware pushed on them via Steam chat, gamers using the popular …
LG software disables Windows security feature, developer says
LG Split Screen software that comes with the company’s ultra wide monitors stealthily weakens Windows users’ defenses by deactivating the OS’ User Account …
Deadly combination of Upatre and Dyre Trojans still actively targeting users
Upatre (or Waski) is a downloader Trojan that has lately become the malware of choice for cyber crooks to deliver additional, more dangerous malware on users’ computers. …
HardSploit: Dedicated hardware pentesting tool
As Internet of Things adoption is gaining momentum, and we hear time and time again that making it secure will be the biggest challenge, French IT security consultancy Opale …
Russian hackers executed the US State Department, White House network breaches
The October 2014 breaches of some of the computer systems of the US State Department and the White House have been executed by Russian hackers, unnamed US officials familiar …
Large malvertising campaign linked to potentially compromised Google ad reseller
Dutch infosec firm Fox IT has spotted a lage scale malvertising campaign that seems to originate from Bulgarian Google ad reseller EngageLab. The first redirection has been …
New Tor version fixes issues that can crash hidden services and clients
Two new versions of the Tor anonymity software have been released on Tuesday, with fixes for two security issues that can be exploited to crash hidden services and clients …
Malware peddlers exploit fear of Android Installer Hijacking bug
The recently disclosed existence of the “Android Installer Hijacking” vulnerability is being exploited by malware and adware peddlers and online survey scammers, …
Firefox loses opportunistic encryption feature due to critical flaw
Less than a week after it made Firefox 37 available for download, Mozilla is pulling one of the security features it implemented. Mozilla is urging users to update again, to …
New crypto-ransomware “quarantines” files, downloads info-stealer
Trend Micro researchers have found and analyzed a new piece of crypto-ransomware: CryptVault encrypts files, makes them look like files quarantined by an AV solution, asks for …
How to keep your Facebook account secure
When last November Facebook asked users to comment the proposed changes to the social network’s terms of use, data policy, and cookies policy, it also introduced Privacy …
Featured news
Resources
Don't miss
- CERT-UA warns against “security audit” requests via AnyDesk
- Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?
- AI-driven insights transform security preparedness and recovery
- NDR’s role in a modern cybersecurity stack
- How Russian hackers went after NGOs’ WhatsApp accounts