Archive

An estimated 35,000 Elasticsearch clusters exposed to the public Internet are potential victims to a series ransom attacks that have already hit over 33,000 MongoDB databases. The attacks, which security researchers Victor Gevers and Niall Merrigan call a “ransack,” have

The launch of Dubai’s Security Industry Regulatory Agency (SIRA) will feature in a full conference programme at Intersec 2017, where leading decision makers will discuss a new law governing the Emirate’s security industry framework, guidelines and expectations. The SIRA Forum

A recently observed targeted attack campaign that hit a major financial services provider was distributing an unknown keylogger disguised as a Silverlight update, Proofpoint researchers reveal. The attack included a small number of emails targeted at just one organization in

Claims of a backdoor in WhatsApp that could be used for third-party snooping were shot down by WhatsApp, which called the allegations false. On Friday, news outlet The Guardian reported that a cryptography researcher had discovered a backdoor in WhatsApp’s

Trend Micro’s Zero Day Initiative (ZDI) published 674 advisories last year and paid out nearly $2 million to researchers who submitted vulnerabilities, the company said in its “2016 Retrospective” report. ZDI encourages responsible disclosure through financial rewards, but the company

It’s time to say goodbye to Yahoo! While Yahoo’s core internet business was being sold to Verizon for $4.8 Billion, the remaining portions of the company left behind is renaming itself to Altaba Inc, which marks the sad ending of

Bitcoin’s prices spike 70% in one month  Wednesday, 4 Nov 2015 | 7:00 AM ET | 00:45 Bitcoin, the world’s most popular digital currency, has been on a roll — but no one is really sure why. After dipping well below

Netgear launched on Thursday a bug bounty program to offer up to $15,000 in rewards to hackers who will find security flaws in its products. Since criminals have taken aim at a rapidly growing threat surface created by millions of

Late last year, researcher Victor Gevers discovered a hijacked database that had its content stolen and replaced with one that informed owners they should pay a ransom to regain access to the content. While thought at first to be an

A slew of sensitive data pertaining to psychologists, doctors and other healthcare professionals involved with an arm of the U.S. Department of Defense was recently left unsecured online. Chris Vickery, a security researcher with MacKeeper who has stumbled across unsecured

In addition to encrypting files, a new strain of ransomware also attempts to carry out a DDoS attack, albeit a weak one. The ransomware, FireCrypt, was uncovered by forensic experts at MalwareHunterTeam and analyzed by Bleeping Computer’s Lawrence Abrams on

The US Department of Energy (DoE) has warned that the country’s electricity grid faces “imminent danger” from cyberattacks that are consistently growing in frequency, magnitude and sophistication. In the second installment of the department’s Quadrennial Energy Review, which focuses on

The notorious black hat hacker CyberZeist (@cyberzeist2) has broken into the FBI website FBI.gov and leaked data on Pastebin. The notorious black hat hacker CyberZeist (@cyberzeist2) has broken into the FBI website FBI.gov and leaked data on Pastebin. The hacker

Released on Tuesday, Google’s first Android Security Bulletin for 2017 patches a total of 95 vulnerabilities in the operating system, 22 of which were rated Critical severity. Over half (50) of the bugs addressed this month were Elevation of privilege

Serious vulnerabilities in smart electricity meters continue to expose both consumers and electric utilities to cyberattacks. However, some have questioned claims that hackers can cause these devices to explode. Smart electricity meters allow service providers to remotely monitor consumption and

Ransomware has long proven to be a major threat for both consumers and enterprises, and a recent campaign targeting corporate Human Resources (HR) departments shows the threat to businesses continues to rise. The attack starts with emails designed to mimic