While Congress is enjoying its annual summer recess, privacy advocates are worried that the White House’s recent endorsement of the controversial CISA bill–which has been criticized by DHS officials, among others–will push the information-sharing bill over the goal line. The Cybersecurity Information Sharing Act is the latest incarnation of Congress’s decade-long effort to legislate some[…]
A rash of compromised WordPress websites is behind this week’s surge in Neutrino Exploit Kit traffic
Apple pushed out a new version of QuickTime that patched nine vulnerabilities, including a handful of denial of service and code execution bugs.
Facebook announced that its ThreatExchange information-sharing platform is closing in on 100 participants and has streamlined its application process.
Apple patched an issue last week in iOS that could have allowed attackers to bypass the third-party app-sandbox protection mechanism on devices and read arbitrary managed preferences via a special app.
A SANS ISC report indicates a prominent cybercrime group has begun using the Neutrino Exploit Kit, but that hardly spells the end of the road for the notorious Angler EK.
Developers with the service Pocket recently fixed some vulnerabilities that could have allowed users to exfiltrate data, including sensitive information regarding web services, internal IP addresses, and more.
Hosting provider Web.com said it was breached last week and hackers made off with payment card and personal data belonging to 93,000 customers.
Italian researcher Luca Todesco explains how exploiting two vulnerabilities in OS X gain enable root access for a hacker. He won’t, however, say why he went public with details and exploit code before Apple patched.
Microsoft released an out-of-band patch for an Internet Explorer vulnerability under attack.