October 31, 2017 Windows Vulnerability Puts NTLM Password Hashes at Risk 2 min read - A Colombian security researcher discovered a flaw that could enable attackers to steal Windows NTLM password hashes without any user interaction.
October 31, 2017 Catch-All Google Chrome Extension Conducts Wide-Ranging Data Theft 2 min read - A malicious Google Chrome extension dubbed Catch-All is using a simple phishing scheme to commit data theft against users in Brazil.
October 20, 2017 Security Vulnerability Puts Linux Kernel at Risk 2 min read - A security vulnerability in the Linux kernel could allow external attackers to escalate privileges and execute malicious code.
October 17, 2017 RSA Key Insecurity Places Business Data at Risk 2 min read - Researchers found that TPM chipsets manufactured by Infineon create weak RSA key information, which could enable fraudsters to compromise corporate data.
October 17, 2017 Severe WPA2 Vulnerability Compromises Wi-Fi Security 2 min read - A Belgian security researcher unearthed a massive WPA2 vulnerability that affects virtually all devices that connect to Wi-Fi networks.
September 28, 2017 Thermal Security Camera Flaws Could Let Cybercriminals Launch Remote Attacks 2 min read - Cybercriminals could launch remote attacks through thermal security camera vulnerabilities. The flaw, first found in FLIR, could also expose other systems.
September 14, 2017 Risky Routers? New Malware Attacks Leverage Popular Hardware by Proxy 2 min read - New malware attacks are using popular router hardware to carry out proxy-based credential stuffing. Admins should regularly install firmware updates.
September 6, 2017 Little-Known PDF Flaw Creates Crashing Concerns 2 min read - A little-known PDF flaw in a parsing library that was originally discovered six years ago is also present in many contemporary and popular file viewers.
August 24, 2017 ROPEMAKER Exploit Could Allow Fraudsters to Alter Emails Post-Delivery 2 min read - A new vulnerability called ROPEMAKER could enable threat actors to replace a benign URL with a malicious one after an email has already been sent.
August 14, 2017 Git Vulnerabilities Found in Version Control Systems 2 min read - Three popular version control systems were found to contain vulnerabilities that could enable threat actors to steal source code.