Several attacks observed over the past few months that rely heavily on PowerShell, open-source tools and fileless malware techniques, might be the work of a single group of hackers.
Lucian Constantin |
18 Mar |
Read more
An unpatched command injection vulnerability could allow hackers to take over enterprise networking products from Ubiquiti Networks.
Lucian Constantin |
17 Mar |
Read more
During the first day of the Pwn2Own hacking contest, security researchers successfully demonstrated exploits against Microsoft Edge, Apple's Safari, Adobe Reader, and Ubuntu Desktop.
Lucian Constantin |
17 Mar |
Read more
Microsoft's batch of security patches for March is one of the largest ever and includes fixes for several vulnerabilities that are publicly known and actively exploited.
Lucian Constantin |
16 Mar |
Read more
A vulnerability patched in the web-based versions of encrypted communications services WhatsApp and Telegram would have allowed attackers to take over accounts by sending users malicious files masquerading as images or videos.
Lucian Constantin |
16 Mar |
Read more
A group of attackers has found a way to hijack the Petya ransomware and use it in targeted attacks against companies without the program creators' knowledge.
Lucian Constantin |
15 Mar |
Read more
The number of websites supporting HTTPS has skyrocketed over the past year and there are many benefits for turning on encryption on your website today.
Lucian Constantin |
14 Mar |
Read more
Google, Apple, Microsoft and other software vendors are working to identify and patch the vulnerabilities described in the CIA leak, but ultimately this doesn't change the status quo of software security.
Lucian Constantin |
14 Mar |
Read more
Intel Security has released a tool that allows users to check if their computer's low-level system firmware has been modified and contains unauthorized code.
Lucian Constantin |
10 Mar |
Read more
Attackers are widely exploiting a recently patched vulnerability in Apache Struts that allows them to remotely execute malicious code on web servers.
Lucian Constantin |
09 Mar |
Read more
Purported CIA documents leaked Tuesday appear to confirm that the U.S. National Security Agency and one of CIA's own divisions were responsible for the malware tools and operations attributed to a group that security researchers have dubbed the Equation.
Lucian Constantin |
09 Mar |
Read more
The U.S. Central Intelligence Agency documents published by WikiLeaks Tuesday shows that one of the agency's teams specializes in reusing bits of code and techniques from public malware samples.
Lucian Constantin |
09 Mar |
Read more
A five-month-old flaw in Android's SSL cryptographic libraries is among the 35 critical vulnerabilities Google fixed in its March security patches for the mobile OS.
Lucian Constantin |
08 Mar |
Read more
The U.S. Department of Justice is asking a federal court to dismiss its indictment in a case that involves a child porn site known as Playpen after a judge asked the government to disclose the hacking technique it used to gather evidence.
Lucian Constantin |
07 Mar |
Read more
HackerOne, the company behind one of the most popular vulnerability coordination and bug bounty platforms, has decided to make its professional service available to open-source projects for free.
Lucian Constantin |
04 Mar |
Read more