A week in security (June 3 – 9)

A weekly roundup of security news from June 3–9, including Magecart, breaches, hyperlink auditing, Bluekeep, FTC, and facial recognition.

Read more

4 lessons to be learned from the DOE’s DDoS attack

The Department of Energy was subject to a DDoS attack that caused major disruptions in their operations. Is the smart grid ready for such an attack? Here are the lessons we can take away from the event.

Read more

Electrum DDoS botnet reaches 152,000 infected hosts

We’ve identified a new piece of malware that is connected to the Electrum botnet.

Read more

Electrum Bitcoin wallets under siege

Threat actors are relentlessly phishing and attacking Electrum Bitcoin wallet users, racking up millions of dollars.

Read more

Emotet revisited: pervasive threat still a danger to businesses

Emotet is often mentioned as one of the most annoying, effective, and costly present-day malware infections. We discuss the reasons why and the proper way to remove it.

Read more

New Golang brute forcer discovered amid rise in e-commerce attacks

E-commerce sites are a hot commodity these days. We dig into how compromised PCs are helping to hack into them to inject skimmers, whether via vulnerabilities in the websites themselves or through a new malware we discovered gaining entry via brute force.

Read more

Flaw in Twitter form may have been abused by nation states

Twitter announced in a blog post Monday that they discovered and addressed a security flaw in one of their support forms. The discovery was made on November 15—more than a month ago—and promptly fixed the next day. So why are we only hearing about it now?

Read more

The 25th anniversary of the webcam: What did it bring us?

This month the webcam has been around for 25 years. How has it developed and which are the concerns surrounding webcams and CCTVs?

Read more

A week in security (August 6 – August 12)

A round-up of the security news from August 6 – August 12, including ransomware, interesting talks during BlackHat, botnets, and the evils of JavaScript.

Read more

Trojans: What’s the real deal?

We take a fresh look at Trojans: the history of the term, the most popular threats over the years, the different types of Trojans, and their relationship with social engineering.

Read more

Select your language