Cybercriminals tailoring tactics for maximum appeal
GFI Software released its report on the most prevalent threat detections encountered during January. Last month saw malware attacks targeting a wide range of potential …
Convincing tax-themed spam leads to malware
With the US tax season underway, users are constantly being targeted with tax-themed spam. The latest one to be spotted is an email purportedly coming from Inuit, a US company …
Compromised WordPress sites lead to Phoenix exploit kit
Several hundred compromised websites that at first glance don’t appear to be malicious have been discovered by M86 researchers. The websites – mostly blogs and …
PoC exploits for Linux privilege escalation bug published
The publication of proof-of-concept exploit code for a recently spotted privilege escalation flaw (CVE-2012-0056 ) in the Linux kernel has left Linux vendors scrambling to …
Pwn2Own 2012: Changed rules, bigger prizes, no more mobile hacks
Pwn2Own, one of the most anticipated hacking contests that takes place each year at the CanSecWest conference in Vancouver, British Columbia, is set to unfold under …
DreamHost hacker accessed pool of unencrypted passwords
DreamHost, one of the world’s most popular and well-known web hosting providers, has sent a warning out to its customers saying that one of their databases containing …
Recycled cybercrime tactics adapted to conceal fraud
GFI Software released its VIPRE Report for December 2011, a collection of the most prevalent threat detections encountered during the month. Phishing campaigns once again …
Exploit code for recent ASP.NET DoS flaw made public
The ASP.NET DoS flaw that has recently been revealed at the Chaos Communication Congress in Berlin has been patched by Microsoft in almost record time, but users who have not …
Amazon users targeted with fake shipping notices
The BlackHole exploit kit has become an increasingly popular way of delivering malware to unsuspecting users. By exploiting a series of unpatched Windows, Java and Adobe …
Ransomware impersonating European police agencies
Ransomware has been around for quite some time and likely won’t disappear soon, as it usually does manage to make inexperienced users fork over to the criminals quite a …
Cutwail botnet’s various spam campaigns
The bot herders behind Cutwail – one of the oldest botnet that’s still alive and kicking and numbers over 1,5 million bots – have recently been spotted using …
ExploitHub offers cash for exploits
ExploitHub, the marketplace for penetration testers, is issuing a bounty for exploits developed against 12 high-value vulnerabilities (CVEs). Security researchers who submit …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility