Fiesta exploit kit’s authors have a new payload to deliver to their victims. Instead of crypto-malware and browser plug-ins, they…
Google Versus Malvertising: Ad Encryption to Start in June
Malvertising campaigns have turned into a huge issue for both organizations and users. Malvertising stands for malicious advertising and is…
Hacked Sony Pictures Confidential Data Published by WikiLeaks
WikiLeaks has recently reported that crucial Sony Pictures Entertainment data consisting of thousands of documents and emails leaked last year,…
Microsoft Easter Promotion Scam Promises $1.4 Million to Gullible Users
Holiday-themed scams are among the most popular ways for cyber criminals to get their hands on valuable information or lure…
Microsoft Adds Z-Ray PHP Debugger to Its Azure Cloud Service
Microsoft has reported that it is equipping its Azure cloud service with a PHP-debug tool. The service is said to…
Apple with New Patches to Fix Cookie Vulnerability in Safari (2019)
As of April 8th, 2015, Apple released its most recent round of patches which also fixed a cookie vulnerability that…
Adobe, Microsoft, and Oracle Issued Their Latest Security Updates (2019)
New security updates for Adobe, Microsoft, and Oracle software were released today. Microsoft issued eleven updates for over twenty-four flaws…
Chrome 42 Fixes 45 Bugs, Google Pays $21,500 to Outside Researches (2019)
A total of 45 vulnerabilities has been found in Google Chrome with the assistance of ‘bug hunters’. Google is said…
10,000 ISIS-Linked Twitter Accounts Suspended
Twitter activists and monitoring specialists have reported that thousands of accounts have disappeared from the networking service. More than 10,000…
WP-Super-Cache’s Glitch Could Affect Over 1 Million Sites (2019)
The WP-Super-Cache plugin has a cross-site scripting (XSS) vulnerability which could enable the attacker to gain a full access and…
Websense Threat Report 2015 to Emphasize on Malware Development
Security conferences and expert reports have turned into very crucial events for the last couple of years. Malware is quickly…
Google’s Partner Engage Lab Compromised: Redirects Users to the Nuclear Exploit Kit
On Tuesday, the cybersecurity firm Fox IT reported a large-scale Google ad campaign distributed by the Google advertising partner in…
ISIS Sympathizers Target WordPress Plugin Vulnerabilities
On Tuesday, the Federal Bureau of Investigation reported that hackers sympathizing to the Islamic State in the Levant (ISIL), a.k.a.…
Cybercrooks Exploit the Android Installer Hijacking Vulnerability
Cyber criminals have been taking advantage of the recently disclosed Android Installer Hijacking Vulnerability by creating fake download pages for…