GCHQ open sources Gaffer, a data collection and mining framework
GCHQ, the UK equivalent of the US National Security Agency (NSA), has released on Monday the source code of Gaffer, a graph database that optimised for “retrieving data …
Critical Joomla RCE bug actively exploited, patch immediately!
An eight-year-old Joomla critical remote code execution vulnerability, which is being actively exploited in attacks in the wild, has been patched by the developers of the …
13 million MacKeeper users exposed in data breach
The company pushing MacKeeper, the security and utility software suite for Macs many consider to be scareware, has confirmed that the database containing passwords and …
Fake “account verification” email targeting Alibaba.com users
Businesses who use Alibaba.com to connect with Chinese manufacturers are being targeted in a recently discovered phishing campaign, Comodo warns. It takes the form of phishing …
Operation targets users of remote access trojans across Europe
In December, Europol and a number of law enforcement and judicial authorities across Europe carried out a two weeks long coordinated action against the use of remote access …
Vuvuzela: An untraceable messaging system aimed at thwarting powerful adversaries
A group of scientists from the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) believe they have created an effective and scalable text-messaging system …
Twitter users warned about being targeted by state-sponsored attacks
Twitter has sent out unexpected warning notices to a number of users, informing them that their account might have been targeted by state-sponsored hackers. “We believe …
Are your competitors organizing DDoS attacks against you?
According to recent research from Kaspersky Lab and B2B International, nearly half (48 per cent) of the companies surveyed believe they know the identity and motivation of …
Cybercriminals increasingly hunting down the money
The tools used by cyber-criminals against businesses in 2015 were different to those used against consumers, according to Kaspersky Lab’s review of corporate threats in …
Week in review: First ever EU rules on cybersecurity, insider threats, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: New Steam escrow system drives impatient users to fake trading sites serving malware …
New Steam escrow system drives impatient users to fake trading sites serving malware
On Wednesday, Valve introduced a new “trade hold” system that should prevent scammers from stealing items from Steam users’ hijacked account, or at least …
Business email compromise scams still happening, still successful
Despite repeated warnings issued by law enforcement, information sharing organizations, and security companies, Business Email Compromise (BEC) scams still abound and the …
Featured news
Resources
Don't miss
- LLMs are automating the human part of romance scams
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible