Security News

'Almost unprecedented' attacks use the old man-in-the-middle diddle – infoseccers Infosec biz FireEye has suggested Iran may be responsible for what it claims are DNS hijacking attacks aimed at...

A DNS hijacking campaign targeting organizations in various sectors around the world may be the work of the Iranian government, FireEye reported on Wednesday. read more

Proof-of-concept hack of a voicemail systems shows how it can lead to account takeovers multiple online services.

This is a really interesting story of an ad fraud scheme that relied on hijacking the Border Gateway Protocol: Members of 3ve (pronounced "eve") used their large reservoir of trusted IP addresses...

Secure messaging applications such as Telegram, Signal and WhatsApp can expose user messages through a session hijacking attack, Cisco’s Talos security researchers warn. read more

Office 365 – the online, subscription-based version of Microsoft’s Office application suite – is one the most widely used enterprise cloud applications/services, which makes it the preferred...

Google cloud business customers were impacted by a Border Gateway Protocol hijacking.

Advisory issued over yet another critical security vulnerability The Apache Foundation is urging developers to update their Struts 2 installations and projects using the code – after a critical...

Poor DNS housekeeping opens the door to account takeover.

Researchers claim that unusual BGP routing changes are actually man-in-the-middle surveillance.