The attack permits the malware to jump onto computers in a unique manner, using the ‘Range’ HTTPS header. The Ursnif malware…
Browsing: Malware and Vulnerabilities
Not sure if you’ve seen, but cloud software company Citrix has been hacked by an organisation called w0rm which exposed…
Researchers have discovered a new data stealing Trojan called Spyumel thatemploys real certificates to evade security tools. Hackers using Spymel…
The Star Wars BB-8 toy can be hacked via a firmware update hijack. Security researchers claim that the firmware update…
In the Rapid7 survey of 250+ global security pros, a majority of respondents report increased spending and focus on incident…
Graham Cluley is reporting that researchers have uncovered two critical vulnerabilities in the TV-streaming EZCast device that can lead to…
A malvertising campaign has been using a free digital certificate it acquired from certificate authority, Let’s Encrypt. The cybercriminals had…
The CIA is looking into whether Russian Hackers were to blame for the cyber attack on the Ukrainian power grid. Experts…
You may have seen news that potentially millions of Drupal users are at risk of cyber attacks after issues with…
As 2016 kicks off, leading cloud security company iSheriff has forecast the top five security threats that businesses will face…