Details of an extensive targeted attack against Swiss defense contractor RUAG were released by Switzerland’s national CERT.
Browsing Category: Vulnerabilities
The tenacious EITest malware campaign is being refueled by the fact it is shifting from the Angler exploit kit to the Neutrino exploit kit.
The Angler Exploit Kit is exploiting the latest Flash zero day and is moving Dridex banking malware. The Magnitude and Neutrino exploit kits have also integrated the 0day.
Microsoft warns of new technique to distribute macro malware that can evade standard virus detection, according to security experts.
Facebook paid researcher Arne Swinnen a $5,000 bounty for a pair of authentication vulnerabilities in Instagram that enabled brute-force attacks against usernames and passwords.
LinkedIn is striking back against websites that are attempting to monetize the 117 million usernames and passwords stolen from the company as part of a 2012 data breach.
When it comes to cloud computing, APIs more or less drive everything, but in the eyes of some researchers, existing security controls haven’t kept pace.
Duo Labs describes how a critical Android vulnerability chains two exploits together to completely pwn an Android OS device.
Ubiquiti Networks is fending off a stubborn worm targeting its networking equipment running outdated AirOS firmware.
More than 100 million LinkedIn usernames and passwords for sale on dark web as 2012 breach comes back to haunt business-savvy social network.