Security News

  • The Next Web
  • The Hackers News
  • Naked Security
  • HelpNet Security
  • NIST
  • Security Week
  • Threat Post
  • Security Week
  • Security Affairs
  • Error
  • Fire Eye
  • Tech Channel


Tesla and SpaceX CEO Elon Musk, along with 115 other artificial intelligence and robotics specialist [...]

Every year, new ideas gain support and determined startups gain momentum. As they do, they influence [...]

Nobody needs to be told how the internet’s growth is giving way to new opportunities and opening new [...]

If you’ve been waiting to pre-order an Xbox One X, now’s your chance. Microsoft has opened up pre-or [...]

Tinder was one of the first innovative apps to break out on the dating scene. The app boasts over 10 [...]

The wonderful world of cryptocurrency has grown from a budding idea to a full-fledged market bonanza [...]

Too much digital ink has been spilled over the apparent demise of email. “What’s to replace email,” [...]

Right now, you can develop the skills to take on this in-demand job with the training in the White H [...]

Many entrepreneurs think that once they’ve found the right person to partner with, the rest of the r [...]

In 1905, an Ohio farmer survived a railroad accident that cost him both of his legs. Two years later [...]

New Snowden Doc Exposes How NSA's Facility in Australia Aids Drone StrikesThe new documents leaked by former NSA contractor Edward Snowden has exposed a United States secreti [...]

Smart Devices Can Be Hijacked to Track Your Body Movements And Activities RemotelyIf your smartphones, tablets, smart refrigerators, smart TVs and other smart devices are smart enoug [...]

Android Trojan Now Targets Non-Banking Apps that Require Card PaymentsThe infamous mobile banking trojan that recently added ransomware features to steal sensitive data a [...]

Two Critical Zero-Day Flaws Disclosed in Foxit PDF ReaderAre you using Foxit PDF Reader? If yes, then you need to watch your back. Security researchers have [...]

Unpatchable Flaw in Modern Cars Allows Hackers to Disable Safety FeaturesToday, many automobiles companies are offering vehicles that run on the mostly drive-by-wire system, [...]

Game of Thrones and HBO — Twitter, Facebook Accounts HackedThe Game of Thrones hacking saga continues, but this time it's the HBO's and GOT's of [...]

Oopss! HBO Itself Accidentally Leaked 'Game of Thrones' Season 7 Episode 6HBO doesn't need hackers to leak its widely watched "Game of Thrones" episodes, as it [...]

Corrupt Federal Agent, Who Stole Bitcoins From Silk Road, Pleads Guilty To Money LaunderingA former the United States Secret Service agent who stole hundreds of thousands of dollars worth of [...]

8 More Chrome Extensions Hijacked to Target 4.8 Million UsersGoogle's Chrome web browser Extensions are under attack with a series of developers being hacke [...]

Backdoor Found in Popular Server Management Software used by Hundreds of CompaniesCyber criminals are becoming more adept, innovative, and stealthy with each passing day. They are no [...]

Faulty Firmware Auto-Update Breaks Hundreds of 'Smart Locks'More features, more problems! Today, we are living in a digital age that is creating a digital heada [...]

Warning: Two Dangerous Ransomware Are Back – Protect Your ComputersRansomware has been around for a few years but has become an albatross around everyone's neck—f [...]

How Just Opening A Malicious PowerPoint File Could Compromise Your PCA few months back we reported how opening a simple MS Word file could compromise your computer using [...]

Gmail for iOS Adds Anti-Phishing Feature that Warns of Suspicious LinksPhishing — is an older style of cyber-attack but remains one of the most common and efficient attack [...]

Facebook Covertly Launches A Photo-Sharing App In ChinaThe Chinese market is no doubt a pot of gold for big technology giants with over 700 million interne [...]

IPS as a Service Blocks WannaCry Spread Across the WANOne of the most devastating aspects of the recent WannaCry ransomware attack was its self-propagatin [...]

Microsoft Launches Ethereum-Based 'Coco Framework' to Speed Up Blockchain NetworkA growing number of enterprises are showing their interest in blockchains, but the underlying softwa [...]

HBO Offered Hackers $250,000 As Ransom to Prevent More LeaksHackers who recently hacked into HBO network and stole scripts, shows, and employee information docu [...]

Cyberspies Are Using Leaked NSA Hacking Tools to Spy On Hotels GuestsAn infamous Russian-linked cyber-espionage group has been found re-using the same leaked NSA hacking [...]

More than 1,000 Spyware Apps Found On Android App StoresIf you think you are downloading apps from Google Play Store and you are secure, then watch out! Som [...]

Ukrainian Man Arrested For Distributing NotPetya Ransomware And Helping Tax EvadersUkrainian authorities have arrested a 51-year-old man accused of distributing the infamous Petya ran [...]

Online CISSP Certification Training Course — Learn from ExpertsIf you dream of making it big in the IT security community, the CISSP certification is a necessary m [...]

CouchPotato: CIA Hacking Tool to Remotely Spy On Video Streams in Real-TimeAfter disclosing CIA's strategies to hijack and manipulate webcams and microphones to corrupt o [...]

Chinese Quantum Satellite Sends First ‘Unhackable’ Data to EarthIn what appears to be the world's first quantum satellite transmission, China has successfully [...]

Malware Encoded Into DNA Hacks the Computer that Reads ItDo you know — 1 Gram of DNA Can Store 1,000,000,000 Terabyte of Data for 1000+ Years? Even in March [...]

How likely is a ‘digital Pearl Harbor’ attack on critical infrastructure?The metaphor might be hyperbole, but there's real concern about the potential for attacks, warn [...]

Drone firm says it’s stepping up security after US army banDJI security patch should ease military fears - but throws up further issues for pilots [...]

‘Pulse wave’ DDoS – another way of blasting sites offlineIf there's one thing we've learned, it's that any new way of DDoSing will reveal that [...]

Phone location privacy – for armed robber – headed to Supreme CourtDefending a convicted armed robber's right to privacy feels distasteful, but defending rights a [...]

News in brief: new Bitcoin fork; HBO hacked; China cracks downYour daily round-up of some of the other stories in the news [...]

Woman targeted with 120 images on public transport via AirDropBluejacking is back, this time via Apple's AirDrop technology, allowing strangers to bombard wo [...]

Uber faces privacy audits every two years until 2037, rules FTCUber 'failed consumers in two key ways' says FTC after probe into catalogue of privacy con [...]

Got an iPhone? Here’s what we think about the security of iOS11Will your iOS device be more or less secure when iOS11 is launched? We've had a look beyond the [...]

It’s baaaack: Locky ransomware is on the rise againLocky had been quiet until new variants started appearing last week. Here's what you need to kn [...]

I play a lot of video games and one of the things I’ve noticed is that when you first start playing, [...]

Today, analysts must either have advanced data science skills to build hunting algorithms that detec [...]

Here’s an overview of some of last week’s most interesting news and articles: EV ransomware is targe [...]

Trend Micro’s Zero Day Initiative has released details about two remote code execution zero-day flaw [...]

A hacker that goes by the handle “xerub” has apparently figured out the decryption key for Apple’s S [...]

SANS ISC handler Xavier Mertens has flagged and analyzed a malicious Word file that, somehow, is mad [...]

New Firebox M Series appliances help SMBs keep up with encrypted traffic WatchGuard Technologies ann [...]

There has been a lot of hype around blockchain technology and the benefits it could potentially brin [...]

The majority of IT security professionals believe encryption backdoors are ineffective and potential [...]

The infamous NotPetya ransomware attack, which started in Ukraine on June 27 but later spread to man [...]

This publication approves the XTS-AES mode of the AES algorithm for data on storage devices. [...]

Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cyc [...]

Researchers at the Black Hat security conference on Thursday showed an iPhone security flaw which ex [...]

The Mozilla Firefox browser experiences it`s first ever Zeroday exploit. (Fixed) [...]

FoxNews is reporting that a Hacker is attempting extort $10 million from the State of Virginia [...]

So many people have asked for our help with infected computers that we put together this review of f [...]

Conflicker updates its self to include a keylogger and tools to find passwords and finanacial data. [...]

The "Conflicker" worm is set to trigger on April 1st. We provide the basic links you need [...]

NOD32 virus version 3918 is quarantining important Windows files [...]

A Canadian man accused of carrying out devastating cyberattacks on Yahoo waived his right to an extr [...]

What appears to be the decryption key for Apple's Secure Enclave Processor (SEP) firmware was p [...]

President Donald Trump ordered the US military on Friday to elevate its cyber warfare operations to [...]

Touchscreens and other components that are often replaced in smartphones and tablets can hide malici [...]

This month's Microsoft patch updates include one particular vulnerability that is raising conce [...]

China's first "cyber court" was launched on Friday to settle online disputes, as the [...]

A newly discovered piece of ransomware hides its components inside online harmless-looking images th [...]

The U.S. Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) and Philips have warned [...]

Continuing our examination of the cyber threat intelligence mind map, we move from the different lev [...]

Trend Micro’s Zero Day Initiative (ZDI) has disclosed the details of two remote code execution vulne [...]

Facebook announced on Thursday the winners of its 2017 Internet Defense Prize. A team of researchers [...]

The public availability of new exploit packages has fueled millions of new attacks on popular applic [...]

New Intelligence Academy Aims to Help Organizations Reduce Risk by Better Understanding Threats and [...]

Some of the big companies hit by the NotPetya malware in late June have reported losing hundreds of [...]

We’ve all heard the phrase: “When one door closes, a window opens.” You can bet that as you’re readi [...]

Voter registration data belonging to the entirety of Chicago’s electoral roll—1.8 million records—wa [...]

Despite yesterday's leak of the Apple iOS Secure Enclave decryption key, experts are urging cal [...]

Mike Mimoso and Tom Spring discuss this week's security news, including a discussion on recent [...]

A hacker identified only as xerub published the decryption key unlocking the iOS Secure Enclave Proc [...]

Cisco patched two high-severity vulnerabilities in its Cisco Application Policy Infrastructure Contr [...]

A critical flaw in Drupal CMS platform could allow unwanted access to the platform allowing a third- [...]

IBM researchers have demonstrated a filesystem-level version of the Rowhammer attack against MLC NAN [...]

Ransomware called IKARUSdilapidated is managing to slip into unsuspecting organizations as an unknow [...]

The impending demise of Adobe Flash will create legacy challenges similar to Windows XP as companies [...]

A.P. Moller -Maersk said June's NotPetya wiper malware attacks would cost the world's larg [...]

A Canadian man accused of carrying out devastating cyberattacks on Yahoo waived his right to an extr [...]

What appears to be the decryption key for Apple's Secure Enclave Processor (SEP) firmware was p [...]

President Donald Trump ordered the US military on Friday to elevate its cyber warfare operations to [...]

Touchscreens and other components that are often replaced in smartphones and tablets can hide malici [...]

This month's Microsoft patch updates include one particular vulnerability that is raising conce [...]

China's first "cyber court" was launched on Friday to settle online disputes, as the [...]

A newly discovered piece of ransomware hides its components inside online harmless-looking images th [...]

The U.S. Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) and Philips have warned [...]

Continuing our examination of the cyber threat intelligence mind map, we move from the different lev [...]

Trend Micro’s Zero Day Initiative (ZDI) has disclosed the details of two remote code execution vulne [...]

Facebook announced on Thursday the winners of its 2017 Internet Defense Prize. A team of researchers [...]

The public availability of new exploit packages has fueled millions of new attacks on popular applic [...]

New Intelligence Academy Aims to Help Organizations Reduce Risk by Better Understanding Threats and [...]

Some of the big companies hit by the NotPetya malware in late June have reported losing hundreds of [...]

We’ve all heard the phrase: “When one door closes, a window opens.” You can bet that as you’re readi [...]

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Securit [...]

Learning About ISIS Intentions Using Open Source Intelligence – How terrorists are exploiting techno [...]

Hackers can hijack mobile devices by hiding malicious chips in a touchscreen and other components th [...]

Analysts at Global Intelligence Insight analyzed the recent Barcelona terrorist attack linking it to [...]

Security experts at Proofpoint have collected evidence that suggests that the Turla APT group is con [...]

President Donald Trump ordered the US Military to create a separate cyber warfare command tasked wit [...]

The Ukrainian central bank warned state-owned and private lenders of the appearance of new the NotPe [...]

Kaspersky discovered a news strain of the mobile banking Trojan Faketoken that displays overlays on [...]

More than 1.8 million voter records belonging to Americans have been accidentally leaked online by a [...]

A hacker Thursday afternoon published what he claims to be the decryption key for Apple iOS’ Secure [...]

RSS Error: This XML document is invalid, likely due to invalid characters. XML error: Mismatched tag at line 639, column 6

FireEye has moderate confidence that a campaign targeting the hospitality sector is attributed to Ru [...]

Many attackers continue to leverage PowerShell as a part of their malware ecosystem, mostly delivere [...]

As a reverse engineer on the FLARE Team I rely on a customized Virtual Machine (VM) to perform malwa [...]

A wide variety of threat actors began distributing HawkEye malware through high-volume email campaig [...]

Introduction In 2016, FLARE introduced FakeNet-NG, an open-source network analysis tool written in P [...]

Throughout 2017 we have observed a marked increase in the use of command line evasion and obfuscatio [...]

In May of 2016, Mandiant’s Red Team discovered a series of vulnerabilities present on Lenovo’s Vibe [...]

UPDATE (July 21): FireEye continues to track this threat. An earlier version of this post has been u [...]

Introduction The following blog discusses a couple of common techniques that malware uses to obscure [...]

FireEye has identified a set of financially motivated intrusion operations being carried out by a th [...]

In this blog, we will take a closer look at the powerful, versatile backdoor known as CARBANAK (aka [...]

Summary In May and June 2017, FireEye observed a phishing campaign targeting at least seven global l [...]

The “EternalBlue” exploit (MS017-010) was initially used by WannaCry ransomware and Adylkuzz cryptoc [...]

Server Message Block (SMB) is the transport protocol used by Windows machines for a wide variety of [...]

WannaCry (also known as WCry or WanaCryptor) malware is a self-propagating (worm-like) ransomware th [...]

Cyber espionage actors, now designated by FireEye as APT32 (OceanLotus Group), are carrying out intr [...]

In 2015, FireEye published details about two attacks exploiting vulnerabilities in Encapsulated Post [...]

Dridex and Locky, two prolific malware families that made waves in 2016 after being distributed in s [...]

In 2017, Mandiant responded to multiple incidents we attribute to FIN7, a financially motivated thre [...]

Five years ago, Mandiant released a proof of concept tool named ShimCacheParser, along with a blog p [...]

FIN7 is a financially-motivated threat group that has been associated with malicious operations dati [...]

In this post we are going to take a quick look at what it takes to write a libemu compatibility laye [...]

FireEye recently identified a vulnerability – CVE-2017-0199 – that allows a malicious actor to downl [...]

Industrial enterprises such as electric utilities, petroleum companies, and manufacturing organizati [...]

FireEye recently detected malicious Microsoft Office RTF documents that leverage CVE-2017-0199, a pr [...]

Episode #260 - Machine Learning, R00TZ, and Internet Weather [...]

Episode #259 SMBLoris-What you need to Know, 15 days SMB Honeypot: Mum, Tons of WannaCry and Evils A [...]

Episode #258 Bitcoins Received in Ransomware Attacks, Turkish Android App Store 100% Flush w/Malware [...]

Episode #257 Stealing MacOS malware, gSoap Security Flaws, Attackers takeover Wordpress sites, more [...]

Episode #256 - RCE Vulnerability in WebEx, LockPOS, and Internet Weather [...]

Episode #255 - Cyber deception, Reverse-engineering Petya, and the Internet Weather [...]

Episode #254 - Systemd Bug, Outdated Third-Party Software, and the Internet Weather [...]

Episode #253 - What Mirai missed, Cybersecurity Labor Crunch, Phishing and the Markley Quiz [...]

Episode #252 - Gartner Summit Highlights, Fileless Ransomware, MacRansom and Internet Weather [...]

Episode #251 - Sambacry Update, RIG Exploit Kit, Malware Samples and Internet Weather [...]

Episode #250 - Adware, Malware in PPT files, and Security Deficiencies in Medical Devices [...]

Episode #249 - A Bug in Samba, Bugs in Subtitles and Internet Weather [...]

Episode #248 - Hacked Android Phones, Anti-virus for cars, a new worm and the John Markley Quiz [...]

Episode #247 - Battle of the Botnets, the James Bond of Botnets and Internet Weather [...]

Episode #246 - Business Email Compromise, Orange is the New Black Hack, and Certificate Pinning [...]

Episode #245 - Employee leaks, Intel Vulnerability and the Internet Weather [...]

Episode #244 - Stranger Vectors, Security Building Blocks and the John Markley Quiz. [...]

Episode #243 - Threat Hunting, a new Phishing Scam and Internet Weather [...]

Episode #242 - BrickerBot malware, Robocalling and Internet Weather [...]

Episode #241 - Fileless malware, retaining security ninjas, the world's biggest robots and [...]

Episode #240 - Android Security 2016 Year in Review, Adware Apps Booted from Google Play and Interne [...]

Episode #239 - Establishing Baselines for Your Network and AT&T ThreatTraq Decrypted - Botnet Ac [...]

Episode #238 - Zero-day Exploits, Javascript Libraries and the Internet Weather Report. [...]

Episode #237 - Spammers Expose Operation, Operation "Bugdrop", Backdoor in DBLTek and the [...]

Episode #236 - Sha-1 Cracked, Akamai's State of the Internet Report, and the Internet Weath [...]