- October 29, 2014A new Shellshock attack targeting SMTP servers has been discovered. Attackers used email to deliver the exploit, which downloads and executes an IRC Bot.
- October 17, 2014A recent investigation revealed that the Sandworm zero day exploit could likely be used to target GE Intelligent Platform CIMPLICITY users. Find out what it does and how you can safeguard your systems against this emerging attack.
- October 15, 2014The term “secure” can only mean so much, especially in the case of the widely-used Secure Sockets Layer (SSL) protocol version 3.0, a 15-year old design Google found to have a major flaw that possibly affects millions of Internet users.
Prepare to Patch: Microsoft Zero-Day Exploit Discovered (Update: Patch for "Sandworm" Vulnerability Released)October 15, 2014A new zero-day exploit that reportedly targets a military organization welcomes Patch Tuesday announcements as Microsoft announces a previously unknown vulnerability on Windows systems. (Update: Patch for "Sandworm" vulnerability has been released.)
- October 03, 2014Earlier this year, a website was compromised and used to spread online baking malware to approximately 7,000 victims in a span of two hours. This video describes how the site was compromised, the details of the attack, and the capabilities of the payloads.
- September 26, 2014There are new reports that mention incidents of botnet attacks that leveraged Shellshock against certain institutions. A botnet is a network of infected computers/systems.
- September 26, 2014Shortly after the Bash vulnerability known as Shellshock was discovered, we've seen attacks using it to deliver DDoS malware onto Linux systems. Bigger, badder attacks are to be expected. What are some of the other potential scenarios?
- September 25, 2014The Bash vulnerability was reportedly already being exploited in the wild, only several hours after news first broke out. At least one sampled malware is capable of launching distributed denial-of-service (DDoS) attacks.
- August 12, 2014Think all apps in your smartphone and tablet are secure? Our analysis on the FakeID vulnerability might change the way you use your apps.