Xtube visitors redirected to exploit kit landing page
Popular adult site Xtube has been compromised to redirect visitors to sites hosting an exploit kit. “Unlike other attacks we have seen in recent times, this one does not …
How companies secure their cloud data
As companies accelerate their adoption of the cloud, the cloud data footprint is expected to grow to 6.5 zettabytes by 2018. This rapid migration of data into the cloud …
Huge spam operation on Twitter uncovered
What does it take to execute a successful spam operation peddling diet pills of questionable effectiveness? For one spammer, it took some 750,000 fake Twitter accounts. …
Researcher finds backdoor opened by Dell’s helper app
A security researcher has discovered a serious bug in Dell System Detect, the software Dell users are urged to use to download the appropriate drivers for their machines. The …
Multifunctional Vawtrak malware now updated via favicons
The Vawtrak (aka Snifula) multifunctional malware has been around since mid-2013. Its information-stealing, backdoor and spying capabilities deservedly earned it the …
Macro-based malware continues to gain traction
After having “rediscovered” the usefulness of MS Office macros, malware peddlers have been ramping up email spam runs delivering documents that request users to …
Half of all Android devices vulnerable to installer hijacking attacks
A critical Android vulnerability that has been discovered over a year ago and responsibly disclosed to Google and other Android manufacturers can be exploited by attackers to …
15,435 vulnerabilities across 3,870 applications were recorded in 2014
In 2014, 15,435 vulnerabilities were discovered according to data from Secunia Research. The vulnerabilities are spread across 3,870 applications published by 500 different …
Mobile apps are not being tested for insecure behavior
Enterprises are not doing nearly enough to understand which mobile app behaviors hitting their networks and data are risky, nor are they testing apps for those risky behaviors …
One in three top Alexa websites is risky
Based on an analysis of the Alexa top one million sites, Menlo Security found that more than one in three of the top domains are either already compromised or running …
Organizations have little control over privileged access
Even though nearly half of IT decision makers admit they have employees with access rights not necessary to their current role, more than one out of four companies indicated …
Premera breach: Are HIPAA standards too low?
Here’s an interesting twist regarding the Premera data breach revealed last week: the company has been deemed compliant with the Health Insurance Portability and …
Featured news
Resources
Don't miss
- Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
- Microsoft blocks risky file previews in Windows File Explorer
- Building trust in AI: How to keep humans in control of cybersecurity
- Researchers expose large-scale YouTube malware distribution network
- Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)