Zeljka Zorz
Researcher publishes JavaScript DoS tool
Trigger-happy attackers looking for additional ways to bring websites to their knees by means of a DoS attack have been given another tool that can aid in their efforts: …
Malware peddlers take advantage of Sony’s decision to pull controversial film
In the wake of Sony Pictures Entertainment’s decision to scrap the theatrical release of the controversial film “The Interview” altogether, cyber criminals …
ICANN systems breached via spear-phishing emails
As many organizations before it, the Internet Corporation for Assigned Names and Numbers (ICANN) has been compromised after some of its employees fell for cleverly constructed …
Ars Technica readers urged to change passwords in wake of hack
In case you haven’t heard already, Ars Technica got hacked over the weekend, so if you are a subscribed reader now would be a good time to change your password. …
Google starts blocking badly behaving Gmail extensions
How to deal with untrustworthy third-party add-ons that could endanger your own users? Prevent them from loading – if you can. That’s what Google recently did with …
Malware peddlers turn again to malicious links
In the continuous see-sawing that spammers and malware peddlers perform between sending out emails with malicious links and those with malicious attachments, the former method …
Researchers confirm multiple Google App Engine security sandbox bypasses
Polish firm Security Explorations, which announced last week that they found over 30 serious security issues in the Java security sandbox of the Google App Engine (GAE), has …
Sony hackers threaten company and movie-goers
Guardians of Peace, the hacker group that hit Sony Pictures Entertainment, has released another batch of data labeled simply with “Michael Lynton,” the name of the …
Sony details employee data compromised in GOP hack
After having disclosed the extent of the employees’ information stolen in the recent hack to the California Attorney General’s Office, Sony Pictures Entertainment …
Attackers worm their way into QNAP NAS devices through Shellshock hole
A worm intent on creating surreptitious backdoors is actively being used to compromise unpatched QNAP network-attached storage (NAS) systems around the world by exploiting the …
Help Google design the Open Web of Things
Do you have an idea how the Internet of Things should work? You might want to share it with Google. The internet giant has long had an interest in IoT technologies, but is …
100k+ WP websites compromised by SoakSoak malware
Sucuri Security researchers are warning about a massive compromise of WordPress sites sporting malicious JavaScript leading visitors to malware. The discovery was made on …
Featured news
Resources
Don't miss
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests