Smominru Botnet Indiscriminately Hacked Over 90,000 Computers Just Last Month
Insecure Internet-connected devices have aided different types of cybercrime for years, most common being DDoS and spam campaigns. But cybercriminals [...]
IT Firm Manager Arrested in the Biggest Data Breach Case of Ecuador’s History
Ecuador officials have arrested the general manager of IT consulting firm Novaestrat after the personal details of almost the entire population of the [...]
Warning: Researcher Drops phpMyAdmin Zero-Day Affecting All Versions
A cybersecurity researcher recently published details and proof-of-concept for an unpatched zero-day vulnerability in phpMyAdmin—one of the most popular [...]
The Definitive RFP Templates for EDR/EPP and APT Protection
Advanced Persistent Threats groups were once considered a problem that concerns Fortune 100 companies only. However, the threat landscape of the recent [...]
United States Sues Edward Snowden and You'd be Surprised to Know Why
The United States today filed a lawsuit against Edward Snowden, a former employee of the CIA and NSA government agencies who made headlines worldwide [...]
Thousands of Google Calendars Possibly Leaking Private Information Online
"Warning — Making your calendar public will make all events visible to the world, including via Google search. Are you sure?"Remember this [...]
125 New Flaws Found in Routers and NAS Devices from Popular Brands
The world of connected consumer electronics, IoT, and smart devices is growing faster than ever with tens of billions of connected devices streaming and [...]
WhatsApp 'Delete for Everyone' Doesn't Delete Media Files Sent to iPhone Users
Mistakenly sent a picture to someone via WhatsApp that you shouldn't have?Well, we've all been there, but what's more unfortunate is that [...]
How Cloud-Based Automation Can Keep Business Operations Secure
The massive data breach at Capital One – America's seventh-largest bank, according to revenue – has challenged many common assumptions about [...]
DSA-4524 dino-im
Debian Security Advisory DSA-4524-1 dino-im -- security update Date Reported: 16 Sep 2019 Affected Packages: dino-im Vulnerable: Yes Security database [...]
DSA-4523 thunderbird
Debian Security Advisory DSA-4523-1 thunderbird -- security update Date Reported: 15 Sep 2019 Affected Packages: thunderbird Vulnerable: Yes Security [...]
DSA-4522 faad2
Debian Security Advisory DSA-4522-1 faad2 -- security update Date Reported: 15 Sep 2019 Affected Packages: faad2 Vulnerable: Yes Security database [...]
US Sanctions 3 North Korean Hacking Groups Accused for Global Cyber Attacks
The United States Treasury Department on Friday announced sanctions against three state-sponsored North Korean hacking groups for conducting several destructive [...]
Yikes! iOS 13 Coming Next Week With iPhone LockScreen Bypass Bug
Good news... next week, on September 19, Apple will roll out iOS 13, the latest version of its mobile operating system.Yes, we're excited about, [...]
Multiple Code Execution Flaws Found In PHP Programming Language
Maintainers of the PHP programming language recently released the latest versions of PHP to patch multiple high-severity vulnerabilities in its core and [...]
New SIM Card Flaw Lets Hackers Hijack Any Phone Just By Sending SMS
Cybersecurity researchers today revealed the existence of a new and previously undetected critical vulnerability in SIM cards that could allow remote [...]
WebARX — A Defensive Core For Your Website
Estonian based web security startup WebARX, the company who is also behind open-source plugin vulnerability scanner WPBullet and soon-to-be-released bug [...]
CISO Kit — Breach Protection in the Palm of Your Hand
CISOs and CIOs need to know better than anyone the security pulse of their organizations. On the other hand, they cannot be flooded with every changing [...]
Popular Period Tracking Apps Share Your Sexual Health Data With Facebook
Hello Ladies, let's talk about periods, privacy, and Facebook.Are you using an app on your smartphone to keep tracks on your periods?Well, it's [...]
The Hottest Malware Hits of the Summer
It's been a summer of ransomware hold-ups, supply chain attacks and fileless attacks flying under the radar of old-school security. With malware [...]