IE flaw targeted in Aurora attacks still actively exploited
Regular software patching is often touted as one of the best things you can do to keep your computer safe against malware infection. Unfortunately, not all users follow that …
Flaw in Nvidia’s rendering software allows hijacking of “computer farms”
A vulnerability in Nvidia mental ray, an extremely popular 3D-rendering software that is often used on “render farms”, could allow attackers to take control of …
Alleged Blackhole author and gang prosecuted in Russia
Paunch, the creator of the infamous Blackhole exploit kit, is being prosecuted along with 12 other individuals involved in a Russia-based cybercrime ring, the Russian Ministry …
Netflix users in danger of unknowingly picking up malware
Users of Silverlight, Microsoft’s answer to Adobe Flash, are in danger of having malware installed on their computers and being none the wiser, as an exploit for a …
Watch out for less advanced malware and new exploit kits
This year, cybersecurity took center stage with nation-state attacks, numerous high-profile data breaches and prominent cybercriminal arrests. Websense Security Labs outlined …
Spam campaign doubles on threats
Some malware peddlers might be moving on from using the Blackhole exploit kit to deliver malicious code, but others are still not ready to give up on it, as proven by a spam …
New IE 0-day actively exploited by Chinese attackers
After having discovered a new IE zero-day exploit being actively used in the wild, FireEye researchers have revealed that the watering hole attack is more than likely mounted …
Cryptolocker surge directly tied with Blackhole downfall
The recent emergence of Cryptolocker as one of the most widespread, visible and deadly threats is directly tied to the arrest of “Paunch”, the creator of the …
New Microsoft 0-day vulnerability under attack
Microsoft has released security advisory KB2896666 informing of a vulnerability (CVE-2013-3906) in the TIFF graphics format that is seeing limited attacks in the Middle East …
Triumfant detects and stops in-memory malware attacks
Advanced Volatile Threats are malware attacks that take place in a computer’s RAM or other volatile memory, and are difficult to detect because they are never stored to …
Solving the dilemma of vulnerability exploitation disclosure
The subject of software and hardware vulnerability disclosure has been debate time and time again, and most agree that, if possible, vulnerabilities should first be disclosed …
Patched IE zero-day and older flaw exploited in ongoing targeted attacks
With this month’s Patch Tuesday, Microsoft has delivered the patch for the infamous Internet Explorer zero-day (CVE-2013-3893) that has been spotted being used in …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments