Zeljka Zorz
Microsoft settles Nitol botnet lawsuit
Less than a month since Microsoft’s revelation that it had disrupted the functioning of the Nitol botnet by effecting a takedown of a domain (3322.org) which was also …
Google alerts users about new state-sponsored attacks
Remember when in June Google announced its intention to start warning Gmail users that their account might be targeted by state-sponsored attackers? A clear warning above the …
Malicious spam campaign targets QuickBooks users
Intuit-themed malicious spam campaigns pop up every couple of months or so, given that the company’s tax preparation, accounting, financial management and billing …
Hackers leak 120,000+ records raided from top universities
Team GhostShell, a hacker group affiliated with Anonymous, has leaked online information from over 120,000 user accounts stolen from the databases of over 100 higher education …
Police raids controversial Swedish web host, Pirate Bay site is down
The Pirate Bay’s website is unreachable and has been down for over a day now, prompting speculation that Monday’s police raid of the premises of Stockholm-based …
Twitter account hijacking exposes easy-to-exploit security flaw
The hijacking of the Twitter account that belongs to user Daniel Dennis Jones and his subsequent investigation into the matter has revealed a Twitter security weakness that …
Bogus AT&T notification leads to phishing
Another month, another bogus AT&T notification, warning recipients to verify their email accounts or they will have them suspended: But where previous fake emails …
Fake Apple Store discount card leads to identity theft
Bogus discount card offers purportedly coming from Apple and offering to recipients to buy a AU$100 worth in store credit for the small sum of AU$9 have recently been …
Pen-testing Cookie Cadger continues where Firesheep left off
When the Firesheep extension was revealed to the world in late 2010, its developer said that his main goal was to get sites to switch to full end-to-end encryption, i.e. SSL. …
Visual Android Trojan as virtual theft aid
The rise of mobile malware in the last few years has been well documented, and the latest reports show that malware sending out text messages to premium rate numbers is the …
White House Military Office breached by Chinese hackers
Following the recent confirmation by a senior intelligence officer with the U.S. Cyber Command that the Pentagon systems and networks are constantly under cyber attacks and …
IEEE password compromise was due to proxy “anomaly”
Romanian researcher Radu Dragusin has revealed last week that he found the usernames and passwords of 100,000 members of the Institute of Electrical and Electronics Engineers …
Featured news
Resources
Don't miss
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects
- Understanding the AI Act and its compliance challenges
- The art of balancing data security with business goals
- Debunking 5 myths about network automation