Please turn on your JavaScript for this page to function normally.
RSA Conference 2015
Alec Baldwin to deliver closing RSA Conference 2015 keynote

Television and film star Alec Baldwin will be part of the closing ceremonies for RSA Conference 2015 taking place on Friday, April 24th in San Francisco, CA. Celebrated as one …

Multi-platform AlienSpy RAT targeting consumers, enterprises

A new Java-based, multi-platform remote access trojan (RAT) is being used to target both consumers and enterprise users. It’s called AlienSpy RAT and, according to …

122 online forums compromised to redirect visitors to Fiesta exploit kit

Over a hundred forum websites have been compromised and injected with code that redirects users to sites hosting the Fiesta exploit kit, Cyphort researchers have found. These …

Scammers deliver malware via fake Steam game pages

Aside from being regularly targeted with phishing scams, fake giveaways leading to online surveys, and having malware pushed on them via Steam chat, gamers using the popular …

LG software disables Windows security feature, developer says

LG Split Screen software that comes with the company’s ultra wide monitors stealthily weakens Windows users’ defenses by deactivating the OS’ User Account …

Deadly combination of Upatre and Dyre Trojans still actively targeting users

Upatre (or Waski) is a downloader Trojan that has lately become the malware of choice for cyber crooks to deliver additional, more dangerous malware on users’ computers. …

MitM, DoS bugs in Network Time Protocol squashed

Two vulnerabilities affecting Network Time Protocol (NTP), which is used for synchronizing clocks of computer systems, have been patched and made available in the latest …

Polymorphic Beebone botnet sinkholed in international police operation

On April 8, a global operation targeted the Beebone (also known as AAEH) botnet, a polymorphic downloader bot which installs various forms of malware on victims’ …

Cybercrime gets easier, attribution gets harder

Threat actors are gaining capabilities through the adoption of cutting-edge tools instead of technical expertise, according to Websense. Redirect chains, code recycling and a …

Securing high-risk, third-party relationships

High-profile attacks reveal that malicious hackers target third-party vendors and supply chain partners as a backdoor into their primary target, according to CyberArk …

HardSploit: Dedicated hardware pentesting tool

As Internet of Things adoption is gaining momentum, and we hear time and time again that making it secure will be the biggest challenge, French IT security consultancy Opale …

Russian hackers executed the US State Department, White House network breaches

The October 2014 breaches of some of the computer systems of the US State Department and the White House have been executed by Russian hackers, unnamed US officials familiar …

Don't miss

Cybersecurity news