Zeljka Zorz
AOL breach confirmed, bigger than initially thought
Recent spam emails apparently sent from AOL email addresses and hawking diet products are a direct consequence of a breach of the company’s networks and systems, AOL has …
Flash 0-day exploited in watering hole attacks, Adobe provides patch
Adobe has pushed out new versions of Flash Player for Windows, Mac and Linux, as a newly discovered zero-day vulnerability affecting the software is being actively exploited …
XSS bug in popular Chinese site exploited to launch DDoS attack
DDoS mitigation firm Incapsula has put a stop to the speculations that the video content provider whose vulnerable website was misused to launch a DDoS attack was YouTube, and …
Mozilla offers $10,000 for bugs in its new cert verification library
In the wake of the recent discoveries of the Heartbleed OpenSSL bug and the SSL “gotofail” bug, Mozilla has announced a new and topical bug bounty program: it …
IE 0-day exploit actively used in attacks against US-based firms
Late on Saturday, Microsoft has published a security advisory warning about “limited, targeted attacks” exploiting a newly discovered zero day vulnerability that …
US DOJ asks Supreme Court to allow warrantless cell phone search
“Kill switches” for mobile phones seems like a great idea for discouraging rampant mobile phone theft going on in the US. As a matter of fact, a bill introduced to …
IoT is inevitable, but security and privacy is a top concern
The Internet of Things – everyday objects connected to the Web – currently seems like an inescapable future. There is a market for such things and devices, but …
FBI informant Sabu directed hacking of foreign govt sites
Hector Xavier Monsegur (aka “Sabu”), the infamous hacker and leader of the Lulzsec hacktivist group, has directed his associates to attack and compromise the …
Tech giants back initiative for funding crucial open source projects
The nonprofit Linux Foundation has announced the Core Infrastructure Initiative, a multi-million dollar project aimed to fund open source projects critical for the global …
Weight loss spam storm hits Twitter, users beware!
Weight loss spam is once again being massively spewed out from compromised Twitter accounts, but the question on everyone’s mind is how the accounts got commandeered by …
French orgs targeted with social engineering attacks
Over the last year, Symantec researchers have been following and warning about exceptionally effective and sophisticated malware delivery / phishing campaigns that have been …
Amazon Cloud Service servers riddled with vulnerabilities
Update with comment from Amazon available below. An investigation spurred by one of the customers of their security product has lead researchers of security company Bkav to an …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader