The Internet Bug Bounty program, a cooperative effort among security experts and vendors, paid out its first $10,000 bounty this week for a serious Flash vulnerability. The flaw, which Adobe fixed in December, was a serious one that has been used in targeted attacks. Started in November, the Internet Bug Bounty is a system set[…]
Browsing Tag: malware
Cisco’s UCS Director infrastructure management product contains a set of default credentials that any remote attacker can exploit to take complete control of any vulnerable machine. The flaw is in UCS Director versions 184.108.40.206 and below. The Cisco UCS Director software is designed to allow administrators to manage a variety of storage, networking, virtualization and[…]
There are at least two different groups running attacks exploiting the recently published zero day vulnerability in Internet Explorer 10, and researchers say one of the groups used the bug to impersonate a French aerospace manufacturer and compromise victims visiting the spoofed Web page.
Less than a week after the Moon worm, new and unrelated vulnerabilities have been reported in Linksys home and small office routers. Hackers can use a simple exploit to gain remote access to the boxes.
Attackers broke into the network of Kickstarter, the crowdfunding platform, and stole a variety of user data, including usernames, addresses, email addresses and encrypted passwords.
A list of almost 8,000 credentials for FTP sites is circulating on the black market; the list includes high profile targets that are at risk for compromise.
A worm is spreading on a number of home and small business routers manufactured by Linksys. Researchers at the SANS Institute have not been able to determine whether there is a malicious payload or learn much about command and control.
OSX/CoinThief, a Trojan that steals Bitcoin wallet credentials and Bitcoin-QT keys has been found on download sites MacUpdate.com and Download.com.
PUNTA CANA–A group of high-level, nation-state attackers has been targeting government agencies, embassies, diplomatic offices and energy companies with a cyber-espionage campaign for more than five years that researchers say is the most sophisticated APT operation they’ve seen to date. The attack, dubbed the Mask, or “Careto” (Spanish for “Ugly Face” or “Mask”) includes a[…]
A new Trojan for Mac OS X disguised as an app for sending and receiving payments steals Bitcoin wallet login credentials.