Security news

The latests cybersecurity news

10 hours agoCould have sworn I deleted that photo from my phone! [PODCAST]
This week: hacking phones at Pwn2Own, the brand new SophosLabs Threat report, and squeezing Shakespeare into one tweet. Enjoy!...
11 hours agoFriday Squid Blogging: Squid Sculptures
Pretty. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.......

12 hours agoEmoji Attack Can Kill Skype for Business Chat
The "Kitten of Doom" denial-of-service attack is easy to carry out....
13 hours agoTexas Hospital Hit With Dharma Ransomware Attack
Altus Baytown Hospital Among Latest Healthcare Cyberattack VictimsAn attack on Altus Baytown Hospital in Texas is the latest ransomware incident reported to federal regulators as a health data breach....
13 hours agoSmartphones: A Double-edged Sword for Terrorists
Bombs and guns aside, a smartphone can be a powerful weapon in the hands of a terrorist -- but it can also provide intelligence services with the tools to track them down. Three years ago to the day, ...
13 hours agoMailing Tech Support a Bomb
I understand his frustration, but this is extreme: When police asked Cryptopay what could have motivated Salonen to send the company a pipe bomb ­ or, rather, two pipe bombs, which is what investigato...
13 hours agoDoes Not Compute: Japan Cyber Security Minister Admits Shunning PCs
A Japanese minister in charge of cyber security has provoked astonishment by admitting he has never used a computer in his professional life, and appearing confused by the concept of a USB drive....
14 hours agoGmail Glitch Offers Stealthy Trick for Phishing Attacks
The issue comes from how Gmail automatically files messages into the "Sent" folder....
15 hours agoHow to auto mount FAT32-formatted drives in Samba
You might have a FAT32-formatted drive that needs to be shared out to users. To do that with write permissions, you must make use of fstab. Jack Wallen shows you how....

Threat Activity

Malicious IP addresses in the last 30 days

Top Countries

Last 30 days

    Top Categories

    Last 30 days

      Vulnerabilities

      The latest vulnerabilities publications

      Risk levels

      Last 30 days
      • 0 Critical
      • 0 High
      • 8 Moderate
      • 4 Low

      Top Vendors

      Last 30 days
      • 3 Wuzhicms
      • 2 Catfish-CMS
      • 2 IBM
      • 1 Wuzhi CMS Project
      • 1 SEM-CMS

      Top Categories

      Last 30 days
      • 5 Cross-Site Request Forgery (CSRF)
      • 4 Cross-Site Scripting (XSS)
      • 1 Information Leak / Disclosure
      • 1 Permissions, Privileges, and Access Control
      • 1 Resource Management Errors

      Authentication

      Last 30 days
      • 8 None
      • 4 Single
      • 0 Multiple

      Access Vector

      Last 30 days
      • 12 Network
      • 0 Adjacent Network
      • 0 Local