Latest Entries »

Israel military said it bombed building housing Hamas cyber forces. View full article »

Exploitable remotely/low skill level to exploit/public exploits are available View full article »

Below follows an unofficial translation of the Annual Report 2018 of the Dutch General Intelligence and Security Service (GISS, known in Dutch as AIVD). The text below is ~9200 words in total. Hyperlinks and parts between [] brackets were added by me. View full article »

The US DHS issued a new Binding Operational Directive (BOD 19-02) instructing federal agencies and departments to patch critical flaws in within 15 days.

View full article »

Good news for the victims of the ZQ Ransomware, security experts at Emisisoft have released a free decryptor tool.

View full article »

I am writing to inform you that personal information about you may have been involved in the recent cyberattack on Citrix. This notice contains information about the incident that occurred, as well as services Citrix is providing and additional steps you can take to protect yourself against any potential misuse of your personal information. We deeply regret that this incident occurred and take the security of employee information seriously. View full article »

I recently disclosed 15 vulnerabilities in Crestron’s AM-100 and AM-101devices. View full article »

Dell SupportAssist Client has been updated to address multiple vulnerabilities which may be potentially exploited to compromise the system. View full article »

A “cyber event” interrupted grid operations in parts of the western United States last month, according to a cryptic report posted by the Department of Energy. View full article »

With our internet-wide telemetry, RiskIQ has discovered some of the most significant Magecart attacks ever carried out. These involved a host of different tools and tactics including several different inject types, skimmers of varying sophistication, and countless intrusion methods. But for every Magecart attack that makes headlines, we detect thousands more that we don’t disclose. A considerable portion of these lesser-known breaches involves third-party payment platforms. View full article »