Latest News
Microsoft Patches Serious Crypto Flaw Found by NSA
Microsoft has kicked off the new decade with fixes for half a century of vulnerabilities, including one discovered by the
App Leaks Thousands of Baby Photos and Videos Online
An app designed to record and share milestones in a child’s development has leaked thousands of images and videos of
Play Store Still Peppered with Fleeceware Apps
Four months after fleeceware’s initial exposure, Android users who purchase “subscriptions” to apps from the Google Play Store are still
Hackers Install Malware on Android Devices That Open Google Play Store to Provide 5* Ratings & Fake Reviews for Malicious Apps
Researchers discovered a new type of strange malware that targeting android device, and use the victim’s mobiles to provide fake
CISA Releases Test Tool for Citrix ADC and Gateway Vulnerability – Sysadmins Can Test Now
CISA has released a new tool for administrators and users to check for Citrix Application Delivery Controller (ADC) and Citrix
Texas School District Loses $2.3m in Phishing Raid
A Texas school district has found out the hard way that phishing attacks remain a serious financial threat to organizations
Aussie Bushfires Donation Site Hit by Magecart Thieves
A website set-up to accept donations for victims of the devastating Australian bushfires has become a victim itself — of
#THIREurope: How Target Improved Its Threat Hunting Capabilities
A threat hunting team can be better enabled when given the time and interest to focus on what it wants.
Seattle to Host Major New Cybersecurity Event
The verdant city of Seattle is to host a new three-day event dedicated to cybersecurity and the cloud. CSA SECtember
TSA Desires “Cybersecurity by Design”
The United States Transport Security Administration (TSA) has publicly announced that it’s on a “quest to merge cybersecurity and information
#THIREurope: APT Groups Now Using Similar Tools in Espionage and Cybercrime Attacks
Speaking at the SANS Institute Threat Hunting and IR Europe conference in London, Tom Hall, principal consultant for incident response
Citrix Admins Urged to Act as PoC Exploits Surface
IT administrators are being urged to put in place mitigations for a serious Citrix vulnerability which the vendor says won’t
Maze Ransomware Operators Leak 14GB of Files Stolen from Southwire
The Maze ransomware gang has released 14GB of files that they claim were stolen from one of its victims, the
The U.S. Government Funded Smartphones Comes Pre-installed With Unremovable Malware
Security researchers from Malwarebytes found pre-installed malware on UMX U683CL handsets. The phones are made under the Lifeline program to
Top 10 Best Linux Distro Operating Systems For Ethical Hacking & Penetration Testing – 2020
There are different OS for Hacking and Penetration Testing with Linux distro is dedicatedly developed for Security Researchers or Ethical
Hundreds of Millions of Broadcom Modems “Haunted” by New Bug
Security researchers are warning of a new critical vulnerability affecting multiple cable modem manufacturers that use Broadcom chips — exposing