A remote code execution flaw in the SAP Windows client opens the door for ransomware attacks targeting enterprises that rely on various...
Last week, KrebsOnSecurity received an email from eBay. The company wanted me to switch from using a hardware key fob when logging...
LastPass says it patched one of two separate bugs that affected its Chrome and Firefox browser extensions, which if exploited, would have...
Metasploit RFTransceiver extension implements the Hardware Bridge API that will allow organizations to test wireless devices operating outside 802.11 spec. Recently we...
With news of another so-called Fappening (nude photos of celebrities distributed without permission) doing the rounds, it was inevitable that scammers would look...
The vulnerability (CVE-2017-2641) allows an attacker to execute PHP code at the vulnerable Moodle server. This vulnerability actually consists of many small...
Over 300 Cisco products are affected by a zero-day vulnerability Cisco discovered last week, and for which no patch is available at...
Increasingly, cyberattackers have been leveraging “non-malware” attack methods to target vulnerable organizations. Recently, the Carbon Black Threat Research Team was alerted about...
In another classic example of why you shouldn’t leaving your work laptop in the car, national security may have been compromised. An...
If you are from India and have ordered Burger in McDonald’s, your personal details are at risk. Security researchers from Fallible found...
Hack worked by stitching together three separate exploits. Contestants at this year’s Pwn2Own hacking competition in Vancouver just pulled off an unusually...
Hacker used flaw in web server to access data uploaded to website of holiday and travel association. Hackers used a flaw in...
In an advisory sent to enterprises across the US, the Department of Homeland Security’s US-CERT group is warning that security products which...
Malicious entity could be tracking phones of domestic, foreign officials. An unusual amount of highly suspicious cellphone activity in the Washington, D.C.,...
The Linux team has patched a “dangerous” vulnerability in the Linux kernel that allowed attackers to elevate their access rights and crash...
Drupal is a content management software. It’s utilized to make a considerable amount of the websites and applications you utilize each day....
Two Russian spies and two hackers were the miscreants who broke into Yahoo!‘s servers and swiped at least 500 million user account...
The Turkish-Dutch political conflict has spewed into cyberspace during the past few days as Turkish hackers have defaced hundreds of websites and...
Following an internal audit, Google engineers say they’d discovered a new massive ad-fraud botnet that was infecting users via Android apps hosted...
Cybercriminals hijack Magento Realex Payments extension to steal payment card data. Experts at Sucuri are observing massive attacks. Cybercriminals continue to target Magento...
Linux has long been the preferred operating system for enterprise platforms and Internet of Things (IoT) manufacturers. Linux-based devices are continually being...