Please turn on your JavaScript for this page to function normally.
New Java 0-day exploited in the wild

A new Java zero-day being exploited in the wild has been found. With the files we were able to obtain we reproduced the exploit in a fully patched, new installation of Java. …

IE zero-day used in targeted watering hole attacks

News that an Internet Explorer zero-day vulnerability was being and has been for quite some time been used in a new “watering hole” attack has livened the …

Most unique viruses of 2012

PandaLabs outlined its picks for the most unique viruses of the past year. Rather than a ranking of the most widespread viruses, or those that have caused most infections, …

Will the Sweet Orange exploit kit dethrone Blackhole?

There’s a new exploit kit being offered for sale and it seems to be slowly but surely gaining in popularity. Dubbed Sweet Orange, the kit uses exploits for Java, PDF, IE …

Cloud exploits and mobile device attacks on the horizon

Although many security experts predict that the most likely data breach threats organizations will face in 2013 include cloud exploits, mobile device attacks and all-out cyber …

Exploits, security threats and hacks will mutate in 2013

Lamar Bailey, Director of Security Research and Development with nCircle, has released his top five security threats to watch out for in 2013. The New Year – and beyond …

Fake CitiBank credit card statement leads to malware

CitiBank customers are advised to tread carefully through their email inboxes as fake credit card statements sporting the bank’s name could be waiting for them: The …

ExploitHub confirms breach

ExploitHub.com, the well-known online marketplace where one can buy exploit code for disclosed vulnerabilities, has confirmed that its web application server was compromised, …

Exploit tool hitting Joomla and WordPress sites

Joomla and WordPress sites’ administrators should consider updating to the latest version of their respective content management system as soon as possible since, …

Six threats to watch out for in 2013

FortiGuard Labs revealed its 2013 threat predictions, highlighting six threats to watch out for next year. 1. APTs Target Individuals through mobile platforms APTs also known …

Exploit kit authors thrive due to PoC code released by whitehats

Do exploit kit authors actually write the exploits they include in their offerings? Sophos’ researcher Gabor Szappanos says the answer is a resounding “No.” …

80% of attacks are redirects from legitimate sites

Sophos released its Security Threat Report 2013, a detailed and interactive assessment of what’s happened in IT security for 2012 and what’s expected for 2013. …

Don't miss

Cybersecurity news