Google Chrome zero-day: Now is the time to update and restart your browser

A particularly dangerous Google Chrome zero-day is already being used in real-world attacks. Despite Google’s auto update feature, users will need to close and restart their browser in order to be protected.

Read more

Spectre, Google, and the Universal Read Gadget

A recently released paper by Google has resurrected the spirit of Spectre, a seemingly never-ending threat to most makes of processor. We take a look at what this means, and what the Universal Read Gadget means for most technology users.

Read more

A week in security (February 18 – 24)

A roundup of security news from February 18–24 covering our most recent blogs and happenings in the world of infosec, including ATM hacking, Facebook location settings, spear phishing, and more.

Read more

New critical vulnerability discovered in open-source office suites

A security researcher recently published a proof of concept exploit for open-source office software LibreOffice and OpenOffice. Will this new vulnerability be used in the wild?

Read more

Improved Fallout EK comes back after short hiatus

The Fallout exploit kit is back with some noteworthy improvements.

Read more

Ryuk ransomware attacks businesses over the holidays

Over the holiday, a little-known ransomware family called Ryuk caused serious damage to numerous organizations. The attacks leave a lot of questions unanswered. What do we know so far?

Read more

Vidar and GandCrab: stealer and ransomware combo observed in the wild

Threat actors combine new stealer Vidar and GandCrab ransomware in one-two punch.

Read more

New Flash Player zero-day used against Russian facility

An APT group is using a new Flash Player zero-day that was used a lure targeting a Russian-based clinic

Read more

Fake browser update seeks to compromise more MikroTik routers

Threat actors are social engineering users with a fake update that, once installed, will scan the Internet in an attempt to exploit vulnerable MikroTik routers.

Read more

Buggy implementation of CVE-2018-8373 vulnerability used to deliver Quasar RAT

A threat actor implements a newer vulnerability exploited in Internet Explorer to serve up the Quasar RAT and diversify the portfolio of attacks.

Read more

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language