Zeljka Zorz
![Patch](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101437/patch-400x200.jpg)
Microsoft releases patch for leaked SMBv3 RCE flaw
After the inadvertent leaking of details about a wormable Windows SMBv3 RCE flaw (CVE-2020-0796) on Tuesday, Microsoft has rushed to release a patch (i.e., security updates). …
![Windows](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100610/windows-400x200.jpg)
Wormable Windows SMBv3 RCE flaw leaked, but not patched
Yesterday, when Microsoft released its regular Patch Tuesday fixes, Cisco Talos and Fortinet inadvertently(?) also published information about CVE-2020-0796, a …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094309/patch-400x200.jpg)
March 2020 Patch Tuesday: Microsoft fixes 115 vulnerabilities, Adobe none
It’s March 2020 Patch Tuesday and Microsoft has dropped fixes for 115 CVE-numbered flaws: 26 are critical, 88 important, and one of moderate severity. The good news is …
![Trojan horse](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095342/trojan_horse-400x200.jpg)
Hackers are getting hacked via trojanized hacking tools
Someone has been trojanizing a wide variety of hacking tools to compromise the machines of hackers who want to use the tools for free, Cybereason researcher Amit Serper has …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113133/bomb-400x200.jpg)
Hackers are compromising vulnerable ManageEngine Desktop Central instances
Is your organization using ManageEngine Desktop Central? If the answer is yes, make sure you’ve upgraded to version 10.0.474 or risk falling prey to attackers who are …
![pppd](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/09161315/pppd-400x200.jpg)
PPP Daemon flaw opens Linux distros, networking devices to takeover attacks
A vulnerability (CVE-2020-8597) in the Point-to-Point Protocol Daemon (pppd) software, which comes installed on many Linux-based and Unix-like operating systems and networking …
![coronavirus](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/09131436/coronavirus-scams-400x200.jpg)
Coronavirus-themed scams and attacks intensify
Scammers and other criminals are always quick to take advantage of crises, and this latest – centered around the spread of the deadly Covid-19 coronavirus around the …
![Facepalm](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104156/facepalm-files-400x200.jpg)
Unsecured databases continue leaking millions of records
UK ISP and telecom provider Virgin Media has confirmed on Thursday that one of its unsecured marketing databases had been accessed by on at least one occasion without …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095734/danger-400x200.jpg)
Fake alerts about outdated security certificates lead to malware
Cyber criminals have been trying out a new approach for delivering malware: fake alerts about outdated security certificates, complete with an “Install …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102343/face-400x200.jpg)
Vulnerability allows attackers to register malicious lookalikes of legitimate web domains
Cybercriminals were able to register malicious generic top-level domains (gTLDs) and subdomains imitating legitimate, prominent sites due to Verisign and several IaaS services …
![Let's Encrypt](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/04133938/letsencrypt-400x200.jpg)
Let’s Encrypt will revoke 3m+ TLS/SSL certificates
Starting with 20:00 UTC (3:00pm US EST), today (March 4), the non-profit certificate authority Let’s Encrypt will begin it’s effort to revoke a little over 3 …
![alert](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094437/alert-400x200.jpg)
How to gather cyber threat intelligence from dark markets without breaking US law
The U.S. Department of Justice’s Cybersecurity Unit has released guidelines for organizations that want to gather cyber threat intelligence from dark web forums/markets but, …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?