Zeljka Zorz
UK sets up cyber attack information exchange center
In an effort to help its private and public sector companies combat the cyber attacks and cyber espionage efforts directed their way, the UK government has launched a new …
Stuxnet attack was illegal under international law, experts say
The Tallinn Manual on the International Law Applicable to Cyber Warfare – the recently released tentative rulebook on what actions should and should not be considered or …
Grum botnet makes a comeback
Last year’s takedown of the Grum botnet was one the most fascinating ones so far, as it triggered a quick response from the botherders who tried to derail law …
Activists now targeted with trojanized backdoor apps
Phishing emails targeting Tibetan and Uyghur activists and containing spying malware masquerading as legitimate DOC and PDF files are nothing new, as such spam campaigns have …
Chinese university tied to “APT1” army cyber unit
By now everybody in the security industry has read the Mandiant APT1 report or at least a TEXTsummary of it, and has heard the many voices of either agreement or dissent …
Fake BBC emails lead to Blackhole, Zeus
Spam emails supposedly coming from CNN and the BBC and delivering links to trending news stories have once again become the preferred way for malware peddlers to lure …
What do users look for in a security solution?
Users are aware of the dangers in the Internet and most of them are already using a security solution, say the results of AV-Comparatives’ annual survey that polled …
Five cuffed for stealing 2M euros via e-banking hacks
Five people were arrested last week when the Slovenian police conducted a series of house searches following an investigation into an gang that was emptying business bank …
Apple adds two-step verification option to iCloud accounts
Apple has finally introduced a two-step verification feature that will allow its users to secure their iCloud (Apple ID) accounts, 9 to 5 Mac reports. The option is currently …
On US, China, cyber espionage, and cyber war
The accusations and recriminations lobbed back and forth between the United States and China regarding alleged state-sponsored cyber espionage attacks have become almost a …
Unraveling the South Korean cyberattacks
Wednesday’s news that the networks of several South Korean broadcasting organizations and banks have been partially or entirely crippled by coordinated attacks has …
Cisco devices saddled with weakened password encryption
Instead of improving it, an implementation issue has left a “limited” number of Cisco IOS and Cisco IOS XE releases with a weaker password hashing algorithm, …
Featured news
Resources
Don't miss
- Attackers exploiting WSUS vulnerability drop Skuld infostealer (CVE-2025-59287)
- How neighbors could spy on smart homes
- How the City of Toronto embeds security across governance and operations
- Hottest cybersecurity open-source tools of the month: October 2025
- OpenAI’s gpt-oss-safeguard enables developers to build safer AI