Mass injection attack compromised 20,000+ domains, delivers fake AV
A simple mistake on the part of cyber attackers has revealed another mass malicious iFrames injection attack that is currently under way, say Armorize’s researchers. …
“Uniform traffic ticket” spam leads to malware
A massive spam campaign taking the form of an email notifying the recipients of a bogus traffic ticket has been detected by a number of security companies. The email in …
Craigslist phishers warn about phishing
Scammers are targeting Craigslist users again – this time with a phishing page that tries to trick users into believing it’s legitimate by containing a warning …
RSA proactively blocks malware threats
RSA announced updates to its CyberCrime Intelligence Service designed to help enterprises monitor and harden their infrastructure against malware infection and data loss. This …
RealPlayer multiple vulnerabilities
Some vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user’s system, according to Secunia. 1. A …
Human Compromise: The Art of Social Engineering
This book teaches you the “how-to” of social engineering. Taking a hands-on approach, you will learn everything from the field-tested methods for reading body …
StealthWatch 6.1 adds internal and external monitoring capabilities
Lancope released a new version of its monitoring platform, the StealthWatch System 6.1. This version increases both the amount and types of flow data that can be processed by …
Integrated content-aware SIEM and firewall
NitroSecurity and Palo Alto Networks have integrated content-aware SIEM and next-generation firewall technology into a complete enterprise security solution designed to …
Researchers identify first flaws in the Advanced Encryption Standard
Researchers have found a weakness in the AES algorithm. They managed to come up with a clever new attack that can recover the secret key four times easier than anticipated by …
PoC keylogger app for smartphones revealed
We are all familiar with keyloggers – software that registers and identifies the keys pressed by a computer user – and its prevalently malicious uses. One of the …
Your name as a Google AdWord
It used to be that advertisers were forbidden from using proper names as Google AdWords, but not anymore. Forbes writer Kashmir Hill discovered that while searching her own …
Fraudster broke into bank accounts by using Facebook info
An English man has been been found guilty of siphoning money out of bank accounts after using social networks to guess the security questions for the account owners’ …
Featured news
Resources
Don't miss
- Hottest cybersecurity open-source tools of the month: January 2026
- A practical take on cyber resilience for CISOs
- OPNsense 26.1 brings updates to open-source firewall management
- WinRAR vulnerability still a go-to tool for hackers, Mandiant warns
- CERT UEFI Parser: Open-source tool exposes UEFI architecture to uncover vulnerabilities