Compromised WordPress sites lead to Phoenix exploit kit
Several hundred compromised websites that at first glance don’t appear to be malicious have been discovered by M86 researchers. The websites – mostly blogs and …
PoC exploits for Linux privilege escalation bug published
The publication of proof-of-concept exploit code for a recently spotted privilege escalation flaw (CVE-2012-0056 ) in the Linux kernel has left Linux vendors scrambling to …
Pwn2Own 2012: Changed rules, bigger prizes, no more mobile hacks
Pwn2Own, one of the most anticipated hacking contests that takes place each year at the CanSecWest conference in Vancouver, British Columbia, is set to unfold under …
DreamHost hacker accessed pool of unencrypted passwords
DreamHost, one of the world’s most popular and well-known web hosting providers, has sent a warning out to its customers saying that one of their databases containing …
Recycled cybercrime tactics adapted to conceal fraud
GFI Software released its VIPRE Report for December 2011, a collection of the most prevalent threat detections encountered during the month. Phishing campaigns once again …
Exploit code for recent ASP.NET DoS flaw made public
The ASP.NET DoS flaw that has recently been revealed at the Chaos Communication Congress in Berlin has been patched by Microsoft in almost record time, but users who have not …
Amazon users targeted with fake shipping notices
The BlackHole exploit kit has become an increasingly popular way of delivering malware to unsuspecting users. By exploiting a series of unpatched Windows, Java and Adobe …
Ransomware impersonating European police agencies
Ransomware has been around for quite some time and likely won’t disappear soon, as it usually does manage to make inexperienced users fork over to the criminals quite a …
Cutwail botnet’s various spam campaigns
The bot herders behind Cutwail – one of the oldest botnet that’s still alive and kicking and numbers over 1,5 million bots – have recently been spotted using …
ExploitHub offers cash for exploits
ExploitHub, the marketplace for penetration testers, is issuing a bounty for exploits developed against 12 high-value vulnerabilities (CVEs). Security researchers who submit …
Thousands of sites compromised following hosting provider hack
California-based hosting provider InMotion has suffered a compromise that resulted in the defacement of thousands of home pages of websites hosted on their infrastructure, …
Researchers crack SSL encryption
Two security researchers have found a way of breaking the SSL/TLS encryption that allows the information that passes from browser/user to server and back be reliable and, …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments