Security News

Notorious spammer Peter Levashov was arrested over the weekend; Levashov is the alleged botmaster behind the Kelihos botnet.

Researchers at Kaspersky Lab today disclosed the activities of the Lamberts APT, a group using many of the tools and tactics found in the Vault 7 dumps.

Researchers spent six months poking holes in Signal and urge a bigger spotlight on security testing.

The ShadowBrokers' latest dump of Equation Group hacks focuses on UNIX systems and GSM networks, and was accompanied by an open letter to President Trump.

A researcher poked holes in seven different IoT devices at last week's Security Analyst Summit, including a host of travel routers, NAS devices, and an IP-enabled camera.

Riverbed Technology, whose products are used by most of the Global 500, patched vulnerabilities in its SteelCentral Portal used for critical application performance monitoring.

Security information and event management solutions are supposed to boost security, but researchers say the network analysis tools are ripe attack targets.

A previously undisclosed baseband vulnerability impacting Huawei smartphones, laptop WWAN modules and IoT components was revealed Thursday at the Infiltrate Conference

David Jacoby and Frans Rosén said at this year's Security Analyst Summit they offered companies free pen-testing and raised $15,000 for charity in the process.

Attackers are attempting to exploit the recent Apache Struts vulnerability on Windows servers and the payload is a variant of the Cerber ransomware.