Threat Outbreak Alert: Fake American Express Payment Processing Notification...
DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain a payment processing notification for the recipient. The text...
View Article[SECURITY] [DSA 2663-1] tinc security update
- -------------------------------------------------------------------------Debian Security Advisory DSA-2663-1 security@debian.orghttp://www.debian.org/security/...
View Article[RHSA-2013:0763-01] Moderate: JBoss Web Framework Kit 2.2.0 update
===================================================================== Red Hat Security AdvisorySynopsis: Moderate: JBoss Web Framework Kit 2.2.0 updateAdvisory ID:...
View ArticleVulnerabilities in multiple plugins for WordPress with jPlayer
I want to inform you about multiple vulnerabilities in multiple plugins forWordPress with jPlayer. These are Cross-Site Scripting and Content Spoofingvulnerabilities.I've wrote about vulnerabilities in...
View Article[ROOT] Motoshare 2: Old Bug, New Exploit
As promised, this post describes how to root the Droid Bionic Jelly Bean build. It should also work on the XT910 Jelly Bean build, but this hasn't been tested yet. Fortunately for Bionic and XT910...
View ArticleVerizon 2013 Data Breach Investigations Report is out!
23 Apr 2013 Dave Hylender - 2012.Perhaps more so than any other year, the large scale and diverse nature of data breaches and other network attacks took center stage. But rather than a synchronized...
View ArticleBotnets, how do they work? Architectures and case studies – Part 2
In the first part of this of this mini-series on the botnet cyber threat, we have shown the current scenario and the technological evolution in security landscape. Malicious architectures are...
View ArticleTrend Micro Q1 2013 Security Roundup Report Highlights Concerns over Zero-Day...
Zero-days progress into attack kits before patches are availableCUPERTINO, Calif., April 23, 2013 /PRNewswire/ -- According to Trend Micro's Q1 2013 Security Roundup Report, the company's researchers...
View ArticleExperian Data Breach Resolution and the Ponemon Institute release new study...
The majority of breached companies admit to consequences, including high business impact, yet they still struggle to take steps to mitigate future incidentsCOSTA MESA, Calif., April 23, 2013...
View ArticleNew Research Shows Remote Users Expose Companies to Cybercrime
Corporate Networks with Mobile Workforce Experienced High Rates of Malware Threats, Hacked Passwords and SQL Injection AttacksBROOMFIELD, Colo., April 23, 2013 /PRNewswire/ -- Results of new remote...
View ArticleVolume of Dangerous Cross-Site Request Forgery Attacks up 132 Percent Since...
FireHost's New IP Reputation Management Filters Block Hack Attempts From More Than One Million Known AttackersLONDON--(Marketwired - Apr 23, 2013) - Infosecurity Europe 2013 -- Secure cloud hosting...
View ArticleFireEye Research Reveals Increasingly Global Nature of Advanced Cyber Attacks
Next-Generation Threat Protection Company Publishes "Advanced Cyber Attack Landscape" Report; Finds 184 Countries Hosting Crimeware Servers; High Technology Companies Most Frequently Targeted; 89...
View ArticleThe Research Reports Keep Coming Today: New Research From Qualys Underscores...
Data Collected From More Than 5 Million Scans on Over 53 Million Hosts Across 12,000 Checks Over a Period of 12 MonthsREDWOOD CITY, CA--(Marketwired - Apr 23, 2013) - Qualys, Inc., a pioneer and...
View ArticleExploiting a Go Binary
ntroductionEarlier this year, tylerni7 showed us a proof of concept for a 32 bit Go exploit using this issue. geohot and I had a wager over who could get the first remote code execution on...
View ArticleTwitter Malware: Spreading More Than Just Ideas
News, blogs, opinions – Twitter is one of the most popular social networks for spreading ideas. It has revolutionized the way millions of people consume news. With 288 million active users, Twitter is...
View ArticleMicrosoft Security Bulletin Re-Releases
********************************************************************Title: Microsoft Security Bulletin Re-ReleasesIssued: April 23,...
View ArticleAP Twitter Feed Exploited Via Phishing Attack Issuing A Fake Terror Attack...
FYI. This was a fake terror attack report falsely referencing that the White House had been attacked and further caused the equity markets to drop 100 points but once the information was reported by...
View ArticleTenable Network Security Announces Nessus 5.2 Vulnerability Scanner
Latest Version of Industry’s Most Widely Deployed Vulnerability and Configuration Assessment Solution Enhances Post-scan Analysis, OS Support, and UsabilityTenable Network Security, Inc., the leader in...
View ArticleMultiple Vulnerabilities in D'Link DIR-615 - Hardware revision D3 / DIR-300 -...
Device Name: DIR-615 - Hardware revision D3 / DIR-300 - Hardware revision AVendor: D-Link============ Device Description: ============DIR-300:...
View Article[RHSA-2013:0744-01] Important: kernel security and bug fix update
===================================================================== Red Hat Security AdvisorySynopsis: Important: kernel security and bug fix updateAdvisory ID:...
View Article