Dell acquires Enstratius
Dell today announced the acquisition of Enstratius, which helps organizations manage applications across private, public and hybrid clouds, including automated application …
IE8 0-day used in watering hole attacks
Last week a U.S. Department of Labor website was discovered to be redirecting users to sites serving a hard-to-detect variant Poison Ivy backdoor Trojan. Researchers are now …
McAfee to acquire Stonesoft
McAfee and Stonesoft today announced a definitive agreement to initiate a conditional tender offer for the acquisition of Stonesoft for approximately $389 million in cash. …
Malware you can “live with”, but shouldn’t
The main symptom of a computer being infected with the ZeroAccess (or Sirefef) malware is that online searches via Google Search often lead to unhelpful pages filled with ads …
No strategy for data protection?
While financial services organizations are obligated to establish and report stringent service availability objectives for mission-critical systems, they are actually among …
Cain & Abel 4.9.44 released
Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …
Week in review: Google Glass hacked, Bitcoin risks, and why we need security awareness training programs
Here’s an overview of some of last week’s most interesting news, reviews and articles: Info of 50M LivingSocial customers compromised following breach …
IRC/HTTP based DDoS bot nukes other bots
Online underground markets seem to offer anything and everything a budding cyber criminal might need. Compromised online accounts? They’ve got them. Malicious domain …
Top Android AV software fooled by common evasion techniques
A team of researchers from Northwestern University and North Carolina State University have tested ten of the most popular Android anti-virus software and have discovered that …
Multi-stage exploit attacks for more effective malware delivery
Most drive-by exploit kits use a minimal exploit shellcode that downloads and runs the final payload. This is akin to a two-stage ICBM (InterContinental Ballistic Missile) …
Trojans account for 80% of malware infections
PandaLabs today published its report analyzing the IT security events and incidents from January through March 2013. In the first quarter of 2013 alone, more than six and a …
Ex employee hacked into high-voltage power manufacturer’s network
A criminal complaint was unsealed on Thursday in federal court in the Eastern District of New York charging Michael Meneses – who was arrested earlier that day in …
Featured news
Resources
Don't miss
- January 2026 Patch Tuesday forecast: And so it continues
- How AI agents are turning security inside-out
- Security teams are paying more attention to the energy cost of detection
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)