Security Bulletins
Latest Malware Updates
Downloader.Busadom!g102/27/2015Infostealer.Posteal02/26/2015Downloader.Busadom02/26/2015Trojan.Ladocosm02/26/2015SONAR.SuspDocRun02/25/2015SONAR.SuspHelpRun02/25/2015W32.Tempedreve.D!inf02/25/2015SONAR.PUA!AlnadInsta02/25/2015SONAR.Infostealer!g502/25/2015SONAR.Infostealer!g402/25/2015 |
News
PayPal: The era of online passwords comes to an endThe company wants to use embedded fingerprint scanners on mobile phones to authenticate users. 02/28/2013US start unprecedented counter-attack on Chinese hackersSuch measures will be held as a response to attacks of Chinese hackers who are accused of stealing American industrial secrets. 02/22/2013Fake Chrome extension compromises Facebook profilesHackers use malware which allows them to gain full control over Facebook profiles. 02/21/2013KrebsOnSecurity: Bit9 Breach Started in July 2012The custom-made malicious software was deployed last year in attacks against U.S. Defense contractors. 02/21/2013Hacker attacked the computers of Apple’s employeesThe company said in a statement that sensitive information was not compromised. 02/20/2013More Than 6 000 Users Signed Microsoft’s “Scroogled” PetitionAnalysts call Microsoft’s campaign a failure, if taking into account that only 0.002 percent of Google’s users signed the petition. 02/15/2013Rodpicom worm aims at infecting Skype and MSN Messenger usersThe worm installs a backdoor on the user's system to download additional malware, sends spam, and connects to the C&C server to download its new versions. 02/13/2013YouTube will be blocked in Egypt for “Innocence of Muslims”Google was not notified about the recent court ruling and didn't receive any orders. 02/11/2013Researchers warn about Whitehole Exploit KitNew toolkit is notable for an ability to hide itself from antimalware detections. 02/07/2013MITRE: Three Possible Ways of New CVE IdentificationNew ways of identifying will give a possibility to register about 999 999 vulnerabilities per year. 02/07/2013Fortinet on “Crime-as-a-Service”According to the company’s report, criminals are trying to create a definite structure in order to organize cybercrimes. 02/07/2013FBI busted cybercriminal ring responsible for $850 lossesCriminals infected the computers of Facebook users with the malware ‘Yahos’. 12/12/2012Iranian authorities have opened access to GmailGmail is now available as users can no longer switch from Gmail to YouTube. 10/01/2012Operation b70: Microsoft has the right to take over domainsUS District Court ruling allows Microsoft to take over domains related to the Nitol virus. 09/14/2012Insiders assisted the hackers to breach Saudi AramcoThe attack was carried out with the help of Shamoon - virus, which was distributed to the company’s intranet and deleted all the data from computers’ hard drives. 09/07/2012The Big Brother gathers IPs of BitTorrent usersThe lists of BitTorrent users are usually updated once in three hours. 09/05/2012Antisec leak data on 12 million Apple clientsHackers posted a file with 1 million Unique Device Identifiers. 09/04/2012Hackers repeatedly broke into Saudi AramcoThe second attack allowed the hackers to steal company’s confidential information. 08/29/2012Saudi Arabia's National Oil Company attacked with virus originated from external sourcesIn the official statement the company noted that roughly 30,000 workstations were affected via cyberattack. 08/27/2012Google: USA needs to ditch software patentsAccording to Google, software patents are not helpful to innovation. 08/23/2012News 101 - 120 of 243 First | Prev. | 4 5 6 7 8 | Next | Last |
Security Advisories Database
Remote Code Execution Vulnerability in Microsoft OpenType Font DriverA remote attacker can execute arbitrary code on the target system. 07/21/2015Multiple Vulnerabilities in Linux kernel03/04/2015SQL Injection Vulnerability in PiwigoSQL inection vulnerability has been discovered in Piwigo. 02/05/2015Cross-site Scripting Vulnerability in DotNetNukeA cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke. 02/05/2015Cross-site Scripting Vulnerability in Hitachi Command SuiteA cross-site scripting vulnerability was found in Hitachi Command Suite. 02/02/2015Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk HandlingAn attacker can perform a denial of service attack. 01/30/2015Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-ForwardsAn attacker can perform a denial of service attack. 01/30/2015Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"An attacker can perform a denial of service attack. 01/30/2015Denial of service vulnerability in Linux Kernel spliceAn attacker can perform a denial of service attack. 01/29/2015Denial of service vulnerability in Python Pillow Module PNG Text Chunks DecompressionAn attacker can perform a denial of service attack. 01/20/2015 |