Major Xen update fixes over 20 vulns, including guest/host escape flaw
The newest version (v4.5.1) of popular hypervisor Xen has been released last week, and includes a bucketload of improvements and bug-fixes, including nearly 20 security …
Hackers are exploiting Magento flaw to steal payment card info
Attackers are exploiting a vulnerability in eBay’s Magento platform to steal users’ billing information (including payment card info), warns Sucuri …
4 in 10 midsize businesses have experienced a data breach
Most midsize business leaders view a data breach among their top risks and a majority consider IT security ‘very important’ when selecting a supplier. They have good reason to …
Week in review: TLS security, malicious Tor exit nodes, how to find a free, secure proxy service
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles:Penetration Testing With Raspberry PiRaspberry Pi is a small and …
Why a low-level threat can open the door for serious infections
“A device hi-jacked for the purpose of conducting click-fraud can become a conduit for more serious malware such as ransomware. A Damballa study cited an example of how …
Update your Flash Player if you don’t want ransomware
“It didn’t take long for exploit kit authors to incorporate an exploit for the recently discovered zero-day Adobe Flash vulnerability (CVE-2015-3113) into their …
Researcher tests Tor exit nodes, finds not all operators can be trusted
While the Tor anonymity network conceals (relatively successfully) a user’s location and Internet activity from anyone who might want to know about it, users should be …
Vegan and BeEF clash shows how cyber arms race never stops
Cyber attackers and defenders are caught in a permanent to-and-fro dance, coming up with new solutions that break the last one created by their adversaries. An example of this …
Facebook slowly fine-tuning its popular ThreatExchange
Facebook’s ThreatExchange, which was unveiled this February, is apparently a hit with organizations, and they are vocal about the ways they believe it could be …
Cisco finds, removes more default SSH keys on its software
Cisco has pushed out security updates to address two vulnerabilities in its Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Content …
How companies can regain consumer trust after a data breach
Americans have strong feelings about data breach notification, with 84 percent stating that the best way a company can regain their trust after a breach occurs is to notify …
Energy security pros: More competent, or just naive?
Energy security professionals are extremely confident in their ability to detect a cyberattack on critical systems, with 86 percent stating they could detect a breach in less …
Featured news
Resources
Don't miss
- RansomHub claims alleged breach of Apple partner Luxshare
- Linux users targeted by crypto thieves via hijacked apps on Snap Store
- Pro-Russian hacktivist campaigns continue against UK organizations
- Cybercriminals speak the language young people trust
- Bandit: Open-source tool designed to find security issues in Python code