Zeljka Zorz
Assume your Drupal 7 site has been compromised
Administrators of sites that run Drupal 7, and have not yet updated to version 7.32 or have done so later than 7 hours after the public revelation of the highly critical SQL …
White House network breach was likely nation-sponsored
The White House has confirmed that the unclassified Executive Office of the President network has been breached by unknown hackers. People in the know speculate that the …
Fake “Online Ebola Alert Tool” delivers Trojan, unwanted apps
Cyber scammers continue to take advantage of the fear and apprehension surrounding the proliferation of the Ebola virus. While Ebola-themed online hoaxes are nothing new, …
ScanBox keylogging framework lurking on disparate watering holes
Watering hole attacks are usually associated with cyber espionage efforts and are booby-trapped with exploit kits that deliver malware onto the visitors’ vulnerable …
Belgacom shares more details about alleged GCHQ breach
Late last year, documents from Edward Snowden’s NSA trove have revealed that Britain’s GCHQ has allegedly mounted a successful attack against primarily state-owned …
Crooks use stolen magnetic payment card info to make fraudulent chip-enabled transactions
The chip and PIN payment card system – or EMV – is considered to be more secure than the magnetic strip one, but it’s also not bulletproof. Nevertheless, US …
Code Red: A global initiative for fighting government surveillance
Well known and widely respected privacy expert and advocate Simon Davies has announced the creation of a new global initiative that’s aimed at supporting the world-wide …
Tor exit node found patching downloaded binaries with malware
A researcher has spotted a Tor exit node located in Russia which instead of delivering the software requested by users untouched, was adding malicious code to the binaries in …
How Facebook prevents account hijacking when old email addresses are recycled
Remember when last summer Yahoo announced they will recycle inactive accounts and offer them to other users? The scheme was more or less successful. Some measures that Yahoo …
Widespread malvertising campaign targets high-profile sites, delivers ransomware
A newer version of the Cryptowall ransomware has been delivered to unsuspecting Internet users via malicious ads shown on a considerable number of high-profile websites, …
Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics
In a recently released whitepaper, Trend Micro researchers have shared many details about a long-standing economic and political cyber-espionage operation they dubbed Pawn …
Attackers bypass Sandworm patch with new 0-day
The Sandworm vulnerability has been patched, but unfortunately attackers have discovered a way to bypass the patch and continue with their targeted attacks. “As with …
Featured news
Sponsored
Don't miss
- Despite economic uncertainty, organizations are prioritizing SaaS security investments
- Confidential AI: Enabling secure processing of sensitive data
- Microsoft releases tool to speed up recovery of systems borked by CrowdStrike update
- Cross-industry standards for data provenance in AI
- Shuffle Automation: Open-source security automation platform