Latest Entries »

The Media Trust’s Digital Security & Operations (DSO) team discovered a new malicious campaign affecting iPhone users of over 100 publisher websites, many of which were UK online newspapers and international weekly news magazines. View full article »

SPPA-T3000 Application Server and MS3000 Migration Server are affected by multiple vulnerabilities. Some of the vulnerabilities can allow an attacker to execute arbitrary code on the server. Exploitation of the vulnerabilities described in this advisory requires access to either Application- or Automation Highway. View full article »

We are saddened to report that on December 2, 2019, the Rooster Teeth online store (https://store.roosterteeth.com/) experienced a data security incident that may have compromised a limited group of customers’ personal information. View full article »

(CNN)New Orleans Mayor LaToya Cantrell declared a state of emergency Friday after the city was hit by a cyberattack. View full article »

Microsoft Threat Intelligence Center (MSTIC) is raising awareness of the ongoing activity by a group we call GALLIUM, targeting telecommunication providers. When Microsoft customers have been targeted by this activity, we notified them directly with the relevant information they need to protect themselves. View full article »

tl;dr – Update to npm v6.13.4 as soon as possible on all your systems to fix a vulnerability allowing arbitrary path access. View full article »

The malware’s dropper is a skeleton that avoids detection as a malicious file.

View full article »

There’s a well-worn saying in security: “If it’s too good to be true, then it probably isn’t.” This can easily be applied to the myriad of online stores that sell counterfeit goods—and now attract secondary fraud in the form of a credit card skimmer. View full article »

Intel issued a firmware update on Tuesday to mitigate an attack, dubbed Plundervolt, which uses voltage fluctuations to reveal secrets such as encryption keys. View full article »

What if you could walk into a room and make every* iPhone or iPad unusable while you’re there? Wait, that sounds evil. What if you could get that one annoying person off their iPhone who’s always on it? View full article »