Microsoft Patch Tuesday fixes 45 vulnerabilities, one being an active zero-day bug used to spread the Dridex banking Trojan.
ShadowBrokers Dump More Equation Group Hacks, Auction File Password
The ShadowBrokers’ latest dump of Equation Group hacks focuses on UNIX systems and GSM networks, and was accompanied by an open letter to President Trump.
Apache Struts 2 Exploits Installing Cerber Ransomware
Attackers are attempting to exploit the recent Apache Struts vulnerability on Windows servers and the payload is a variant of the Cerber ransomware.
Chrome Security Team Tackles ‘Friendly Fire’ To Keep Browser Safe
Justin Schuh, lead engineer of Chrome Security, said ensuring browser security for Chrome users is a balancing act juggling OEM pressures, questionable certificate authorities and quashing third-party software incompatibility issues.
Security Analyst Summit 2017 Day Two Recap
Mike Mimoso and Chris Brook recap the second day of Kaspersky Lab’s Security Analyst Summit, including how a Brazilian bank was compromised, and more.
More evidence that Android is the most targeted mobile device
The bad guys are increasingly using potentially unwanted applications to sneak past security defences, warns Sophos Labs
When scams know too much… [VIDEO]
Watch our Facebook Live video to learn how to defend against scams where the crooks are threatening you with stolen data they already have.
New RAT Targets Koreans And Is Skilled At Evading Detection
Cisco Talos researchers spot a stealthy new remote administration tool calling ROKRAT that targets Korean-language Microsoft Word alternative Hangul Word Processor.
Details Around Romanian Phishing Kit Creator, Campaign Revealed
Researchers at the Security Analyst Summit on Monday divulged details behind the alleged creator of a Romanian phishing kit.
Android Variant of Notorious Pegasus Spyware Found
Researchers say a variant of the notorious surveillance software called Pegasus has been targeting Android users allowing third parties to take screenshots, capture audio, read email and exfiltrate data from targeted phones.