Duqu 2.0: Reemergence of an aggressive cyberespionage threat
Attackers use new version of Duqu worm in ambitious attacks against telecoms, electronics and even information security sectorsRead More
View ArticleMERS outbreak used as bait to spread Trojan.Swort
Attackers are taking advantage of the outbreak of Middle East Respiratory Syndrome (MERS) in South Korea and other regions to spread Trojan.Swort through spam emails.Read More
View ArticlePassword recovery scam tricks users into handing over email account access
Attackers are compromising Gmail, Hotmail, and Yahoo Mail accounts with just text messages and a little social engineering.Read More
View ArticleApple vulnerabilities pose serious threat to passwords and credentials
Unpatched vulnerabilities in Mac OS X and iOS allow malicious apps to bypass security and steal credentials.Read More
View ArticleDyre emerges as main financial Trojan threat
After takedowns against rival operations Dyre has filled the vacuum and now poses a major threat to banking customers in many countries.Read More
View ArticleAdobe publishes emergency patch for exploited Flash vulnerability
Adobe has patched a Flash vulnerability that allowed attackers to remotely execute arbitrary code.Read More
View ArticleBrazilian musician Christiano Araujo's tragic death used to spread malware
Famous singer’s death used as lure to spread financial Trojan Infostealer.Bancos.Read More
View ArticleAustralians beware: Scammers are impersonating the Australian Taxation Office
Australian tax payers are receiving malicious emails that infect computers with Downloader.Upatre and Infostealer.Dyre. Read More
View ArticleTeam GhostShell hacking group back with a bang
Hackers claim to have hacked a growing list of websites, compromising credentials and other sensitive user information.Read More
View ArticleLeaked Flash zero-day likely to be exploited by attackers
Proof-of-concept code to unpatched vulnerability published after breach at hackers-for-hire company.Read More
View ArticleMorpho: Profiting from high-level corporate attacks
Multi-billion dollar corporations hit by secretive attack group.Read More
View ArticleCritical OpenSSL vulnerability could allow attackers to intercept secure...
Users advised to update to latest version of popular open source implementation of SSL/TLS.Read More
View ArticleHacking Team woes adds to the dangers faced by internet-using public
Fallout from Hacking Team breach has serious online safety implications for the public.Read More
View ArticleSecond PoC Exploit for Adobe Flash Player Discovered after the...
Yet Another Adobe Flash Player Zero-Day from Hacking Team Breach.Read More
View Article“Forkmeiamfamous”: Seaduke, latest weapon in the Duke armory
Low-profile information-stealing Trojan is used only against high-value targets.Read More
View ArticleThird Adobe Flash zero-day exploit (CVE-2015-5123) leaked from Hacking Team...
Exploits continue to leak from the Hacking Team breach, as the latest unpatched Adobe Flash Player bug comes from the stolen cache.Read More
View ArticleJava zero-day vulnerability used in limited attacks
Vulnerability is reported to be exploitable by way of drive-by-download on the latest version of Java (1.8.0.45).Read More
View ArticleMicrosoft Patch Tuesday – July 2015
This month the vendor is releasing 14 bulletins covering a total of 58 vulnerabilities. Twenty-four of this month's issues are rated ’Critical’.Read More
View ArticleLeaked Hacking Team Windows vulnerability could facilitate remote attacks
Gravity of threat means Windows users should update operating system immediately.Read More
View ArticleBlack Vine: Formidable cyberespionage group targeted aerospace, healthcare...
The Black Vine attack group not only breached Anthem, but targeted multiple industries with zero-day exploits and custom malware since 2012.Read More
View Article