Zeljka Zorz
Researchers create searchable database of intelligence operators
The researchers behind Transparency Toolkit, a venture whose goal is to develop source software to collect and analyze publicly available data on surveillance and human rights …
Lenovo makes new critical security mistakes
After the Superfish debacle earlier this year, Lenovo’s security practices have once again been found lacking as researchers have discovered several vulnerabilities in …
Year-old flaw in popular WordPress plugin still actively exploited
Sucuri Security researchers have discovered yet another malicious campaign redirecting users to sites hosting exploits. As per usual, the attackers are mostly leveraging …
Netflix open sources FIDO, its automated incident response tool
Netflix has open sourced FIDO (Fully Integrated Defense Operation), a system for automatically analyzing security events and responding to security incidents that the company …
As Uber account compromises continue, company says they weren’t breached
Transport service company Uber has had its fair share of problems through the years, but lately instances of hacked accounts and fraudulently booked trips seem to have …
Company invokes DMCA to block researcher from disclosing flaws in its product
Electronic lock maker CyberLock has attempted to prevent IOActive from releasing information about a host of security flaws they discovered in its product of the same …
Windows 10 spells the end of Patch Tuesday
Microsoft is ready to abandon the longstanding patching schedule that saw patches and security updates being delivered on the second Tuesday of every month. With the advent of …
USBKill turns thumb drives into computer kill switches
A coder that goes by the online handle “Hephaestos” has shared with the world a Python script that, when put on an USB thumb drive, turns the device in an …
New infostealer tries to foil analysis attempts by wiping hard drive
“Cisco researchers have discovered a new information-stealing Trojan that reads and records any plain-text data the victim types into their browser. But this discovery …
New AlphaCrypt ransomware delivered via Angler EK
“Yet another type of ransomware has been detected by malware researchers. Dubbed AlphaCrypt, it appropriates the look of TeslaCrypt, but operates similarly to Cryptowall …
EllisLab servers breached by hackers wielding stolen admin password
EllisLab, the company behind the popular ExpressionEngine CMS, has suffered a breach after hackers managed to gain unauthorized access to its servers.“At 10:49am PDT on …
Mozilla pushes for full HTTPS use
Mozilla has announced they are planning to deprecate non-secure HTTP.“After a robust discussion on our community mailing list, Mozilla is committing to focus new …
Featured news
Resources
Don't miss
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders
- Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers