August 24, 2017 ROPEMAKER Exploit Could Allow Fraudsters to Alter Emails Post-Delivery 2 min read - A new vulnerability called ROPEMAKER could enable threat actors to replace a benign URL with a malicious one after an email has already been sent.
July 10, 2017 NotPetya Operators Installed Three Backdoors on M.E.Doc Software Server Before Activating Malware 2 min read - New research revealed that the threat actors behind the recent NotPetya wiperware attacks had established three backdoors in the M.E.Doc servers.
June 22, 2017 Stack Clash Bug Could Compromise Linux and Unix Defenses 2 min read - Attackers could exploit a vulnerability known as the Stack Clash bug to gain full root privileges, according to researchers at security firm Qualys.
Network June 9, 2017 Don’t Wait for the Next WannaCry — Update Your SMB Protocol Before It’s Too Late 2 min read - To defend your infrastructure against future exploits, it's critical to disable the insecure original version of the SMB protocol.
April 25, 2017 Stuxnet: The Computer Worm That Keeps on Living 2 min read - Kapersky Labs explained that the life of a computer worm exploit doesn't end with the release of a security patch. Stuxnet is one example.
October 31, 2016 Windows Atom Tables Could Blow Up Security, Researchers Say 2 min read - Researchers from enSilo may have too much time on their hands: Instead of putting out fires, they came up with a method to nuke Windows security. To make it worse, this attack vector cannot be patched because of how it…
Software Vulnerabilities September 27, 2016 Shellshock Anniversary: Major Security Flaw Still Going Strong 5 min read - As if to celebrate its two-year anniversary, Shellshock, one of the most infamous bugs of 2014, ramped up its activity in September.
Mainframe August 29, 2016 The Increasing Dangers of Code Hooking 2 min read - Cybercriminals use code hooking to intercept OS function calls to alter or augment their behavior. The technique is becoming more popular and dangerous.
May 9, 2016 Friendly Warning: PoC Exploits Dial In on Social Media Channels 2 min read - Researchers attempt to find PoC exploits with good intentions, but that doesn't stop cybercriminals from taking advantage when they have the chance.
January 26, 2016 Cryptowall 4.0: Now Part of a Bad-News Bundle 2 min read - Cryptowall 4.0 now comes bundles into the Angler exploit kit, among other dangerous packages. Here's what you need to know about this threat.