Simple Authentication and Security Layer (SASL) vulnerabilities

The Simple Authentication and Security Layer (SASL) is an essential element of online authentication. But are you aware of all the known vulnerabilities? And, more importantly, have you patched them?

Read more

Cybercrime tactics & techniques Q2 2018

The last quarter is likely the last hurrah of the campaigns and attacks we’ve been seeing over the last 6 months. What comes next may completely change the game. Check out our latest Cybercrime Tactics & Techniques report to find out more about what you may encounter next quarter.

Read more

SamSam ransomware: what you need to know

We take a look at SamSam ransomware, the malware that messed with Atlanta, and tell you how it works and what you can do to combat it.

Read more

Drive-by download campaign targets Chinese websites, experiments with exploits

This custom made drive-by download attack targets some Chinese websites and their visitors while experimenting with exploits.

Read more

Decoy Microsoft Word document delivers malware through a RAT

A Remote Administration Tool (RAT) is delivered via an unusual route: a benign-looking Microsoft Word document with an ulterior motive.

Read more

RoughTed: the anti ad-blocker malvertiser

A look at RoughTed, a purveyor of ad-blocker aware malvertising responsible for a range of scams, exploits, and malware.

Read more

ShadowBrokers releases more stolen information

ShadowBrokers shocked the security world again today by releasing another cache of exploits, files, and operational documents purportedly stolen from Equation Group last summer. As you may recall from our earlier publications, Equation Group is reportedly a clandestine hacking group that has been linked with NSA hacking tools.

Read more

ShadowBrokers fails to collect 1M bitcoins – releases stolen information

ShadowBrokers finally made good on their promise to release the decryption key to unlock the stolen ‘auction’ file purportedly filled with NSA hacking tools.

Read more

What are exploits? (And why you should care)

At one point in the not-so-distant past, exploits were responsible for delivering 80 percent of malware to people’s systems. But exploits seem to be experiencing a lull today. Does this mean they’re gone for good or is this simply the calm before the storm? Let’s break down this stealthy threat so you can not only know your enemy, but also be appropriately prepared should the exploit attacks return.

Read more

Tor Browser zero-day strikes again

A new zero-day has been found in the wild and was used against the popular Tor Browser. This exploit was meant to leak information about users, such as their IP address.

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language