Security News


A week after disclosing a cross-site request forgery vulnerability in small wind turbines manufactured by a company called XZERES, a security researcher has discovered a serious bug in the...

Cyber attacks and data breaches very often start with phishing or spear-phishing. Access to good credentials is key - whether it's for straight emailing or direct access to target email systems, etc. ...





Tens of thousands of home and office-based routers have been hijacked over the last several months to stage a distributed denial of service attack campaign.

Zscaler has discovered a number of WordPress sites that have been backdoored and sending credentials to a hacker-controlled website.