•  
  • By Catalin Cimpanu
  • August 31st, 2016
Redis Servers Targeted with Fake Ransomware

Redis Servers Targeted with Fake Ransomware

Crook deletes victim's files and then asks for money

  •  
  • By Catalin Cimpanu
  • August 30th, 2016
New and Mysterious FairWare Ransomware Targets Linux Servers

New and Mysterious FairWare Ransomware Targets Linux Servers

Users should be cautious before paying the ransom

  •  
  • By Catalin Cimpanu
  • August 26th, 2016
Mozilla Launches Free Website Security Testing Service

Mozilla Launches Free Website Security Testing Service

Observatory code is open source and available on GitHub

  •  
  • By Catalin Cimpanu
  • August 25th, 2016
SWEET32 Attack: 3DES and Blowfish Ciphers Considered Insecure

SWEET32 Attack: 3DES and Blowfish Ciphers Considered Insecure

HTTPS and VPN traffic broken with new semi-practical attack

  •  
  • By Catalin Cimpanu
  • August 25th, 2016
German Man Behind IRC-Controlled WordPress Botnet

German Man Behind IRC-Controlled WordPress Botnet

Botnet is still active because of complex legal procedures

  •  
  • By Catalin Cimpanu
  • August 17th, 2016
WordPress Plugin Hijacks Websites to Show Payday Loan Ads

WordPress Plugin Hijacks Websites to Show Payday Loan Ads

Plugin author recognizes mistake, fixes plugin

  •  
  • By Catalin Cimpanu
  • August 16th, 2016
FalseCONNECT Vulnerability Affects Software from Apple, Microsoft, Oracle, More

FalseCONNECT Vulnerability Affects Software from Apple, Microsoft, Oracle, More

Multiple other vendors may still be affected

  •  
  • By Catalin Cimpanu
  • August 15th, 2016
Hackers Insert SEO Spam on Legitimate Sites via WordPress Core Files

Hackers Insert SEO Spam on Legitimate Sites via WordPress Core Files

Crooks use whatever technique they can to prevail

  •  
  • By Catalin Cimpanu
  • August 14th, 2016
New FFS Rowhammer Attack Hijacks Linux VMs

New FFS Rowhammer Attack Hijacks Linux VMs

Attack was successful in tests against Debian and Ubuntu

  •  
  • By Catalin Cimpanu
  • August 12th, 2016
Locky Ransomware Uses Vulnerable PHP Forms for Spam Distribution

Locky Ransomware Uses Vulnerable PHP Forms for Spam Distribution

Updating the vulnerable PHP scripts solves the problem

  •  
  • By Catalin Cimpanu
  • August 10th, 2016
TCP Flaw in Linux Servers Allows Web Traffic Hijacking

TCP Flaw in Linux Servers Allows Web Traffic Hijacking

All Linux kernels put out in the past four years affected

  •  
  • By Catalin Cimpanu
  • August 6th, 2016
Linux Botnets Dominate the DDoS Landscape

Linux Botnets Dominate the DDoS Landscape

77.4% of targeted resources were located in China

  •  
  • By Catalin Cimpanu
  • August 4th, 2016
Expired Domains Associated with WordPress Plugin Show Ads, Scareware

Expired Domains Associated with WordPress Plugin Show Ads, Scareware

The blame falls on webmasters, not plugin developers

  •  
  • By Catalin Cimpanu
  • August 3rd, 2016
Web Server Makers Plug Four Security Holes in HTTP/2 Protocol Implementation

Web Server Makers Plug Four Security Holes in HTTP/2 Protocol Implementation

Major servers address important HTTP/2 attack vectors

  •  
  • By Catalin Cimpanu
  • July 27th, 2016
Citibank Sysadmin Gets 21 Months in Jail for Wiping Bank's Routers

Citibank Sysadmin Gets 21 Months in Jail for Wiping Bank's Routers

Angry employee shuts down 90% of Citibank servers

  •  
  • By Catalin Cimpanu
  • July 19th, 2016
New Made-in-China Web Shell Threatens the Security of Web Servers Worldwide

New Made-in-China Web Shell Threatens the Security of Web Servers Worldwide

New Cknife Web shell modeled after old China Chopper shell

  •  
  • By Catalin Cimpanu
  • July 18th, 2016
HTTPoxy Vulnerability Affects CGI-Based Apps in PHP, Python, and Go

HTTPoxy Vulnerability Affects CGI-Based Apps in PHP, Python, and Go

Fifteen-year-old vulnerability comes back to life

 
Want more? Browse: