Researchers at Cisco spotted targeted attacks moving remote access Trojans via the AutoIt administration and scripting tool.
Browsing Category: Web Security
Github said it turned back a distributed denial of service attack; it’s unknown whether this attack is related to a similar attack this March.
Charlie Miller, one of the more respected and accomplished security researchers in the industry, is leaving Twitter’s security team after three years.
In the latest installment of a long and winding court case related to multiple data beaches at Wyndham Worldwide several years ago, an appellate court has upheld the authority of the Federal Trade Commission to punish the hotel chain for lax security practices that allegedly led to the breaches.
The dismantled AlientSpy remote access Trojan, the same malware found on the phone of dead Argentine prosecutor Alberto Nisman, has resurfaced with new crypto and a new name.
A rash of compromised WordPress websites is behind this week’s surge in Neutrino Exploit Kit traffic
Facebook announced that its ThreatExchange information-sharing platform is closing in on 100 participants and has streamlined its application process.
A SANS ISC report indicates a prominent cybercrime group has begun using the Neutrino Exploit Kit, but that hardly spells the end of the road for the notorious Angler EK.
Developers with the service Pocket recently fixed some vulnerabilities that could have allowed users to exfiltrate data, including sensitive information regarding web services, internal IP addresses, and more.
Italian researcher Luca Todesco explains how exploiting two vulnerabilities in OS X gain enable root access for a hacker. He won’t, however, say why he went public with details and exploit code before Apple patched.