Zeljka Zorz
Google Apps scripts can be easily misused by scammers
Andrew Cantino, VP of Engineering at Mavenlink but also a bug hunter in his free time, has discovered that Google Apps Scripts can be misused by attackers to access …
Freenode suffers breach, asks users to change their passwords
Popular IRC network Freenode has suffered a security breach and is asking users to change their passwords, as they might have been compromised. “Earlier today the …
Bulletproof SSL and TLS
Deploying SSL or TLS in a secure way is a great challenge for system administrators. This book aims to simplify that challenge by offering extensive knowledge and good advice …
Home Depot and Target attackers likely not the same
More details about the malware used in the Home Depot breach have surfaced, and it seems that, after all, it wasn’t the one used in the Target breach (BlackPOS). …
Yahoo’s fight against US govt secret surveillance revealed
Unsealed documents from Yahoo’s challenge to the expansion of US surveillance laws in 2007 and 2008 have shown how the company was ultimately made to comply to the US …
Researchers find malicious extensions in Chrome Web Store
Earlier this year, Google has made it so that extension that are not hosted on the Chrome Web Store can’t be installed and used by users of its popular browser. This …
Researchers unlock TorrentLocker encryption
A team of Finnish researchers has discovered that the files encrypted by the recently unearthed TorrentLocker ransomware can be decrypted without paying the ransom – if …
Massive Gmail credential leak is not result of a breach
By now, you might have heard that there has been a leak of a nearly 5 million username and password combinations associated with Google accounts. According to an RT report, …
Microsoft refuses to hand over emails stored in Ireland, held in contempt by judge
Microsoft has urged US District Judge Loretta Preska, the judge presiding over the case that sees the company refusing to hand some emails stored in its Dublin facility over …
Phishers resort to AES crypto to obfuscate phishing sites
Phishers have started employing AES encryption to disguise the real nature of phishing sites from automatic phishing detection tools. This is the latest obfuscating trick in …
DARPA is after vulnerabilities in algorithms implemented in software
The Defense Advanced Research Projects Agency (DARPA) is looking for new program analysis techniques and tools to enable analysts to identify vulnerabilities in algorithms …
Home Depot breach confirmed, stolen info used to change PINs, collect money
In a terse statement, and an annoyingly repetitive FAQ, Home Depot has confirmed that it had suffered a breach of its payment data systems. The breach could impact any …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader