Bot protection firm Distil Networks has published its annual report that uncovers trends and statistics on global bot traffic across the Internet.
read more
Cisco Patches Serious DoS Flaws in IOS Software
Updates released by Cisco on Wednesday for its IOS and IOS XE networking software patch several denial-of-service (DoS) vulnerabilities identified by the vendor’s own employees and external researchers.
read more
Oracle Reissues Patch for Two-Year-Old Java Flaw
Oracle announced on Wednesday that it has released an update for Java SE to address a serious vulnerability.
read more
Cyber-Attacks Expected Following Belgium Bombings
Cyber-Attacks Expected After Islamic Terrorist Attacks in Belgium
read more
Mobile Forensics Firm to Help FBI Hack Shooter’s iPhone
Israel-based mobile forensics firm Cellebrite is believed to be the mysterious “outside party” that might be able to help the FBI hack the iPhone belonging to the San Bernardino shooter.
read more
Reducing Time to Detection: Breaking the One-day Barrier
To Consistently and Significantly Reduce Time to Detection, Security Teams Must Combine Sophisticated Threat Defenses with Skilled Security Researchers
read more
Privilege Escalation Flaw in OS X Allows SIP Bypass
SentinelOne lead OS X security expert Pedro Vilaça discovered a serious local privilege escalation vulnerability in OS X that can be leveraged to bypass Apple’s recently introduced System Integrity Protection (SIP) feature.
read more
Chinese National Admits Hacking US Defense Firms
A Chinese national pleaded guilty Wednesday on charges stemming from the hacking of trade secrets from US defense contractors, including plans for transport and fighter jets, officials said.
read more
Is DROWN a ‘Hello Kitty’ SSL Vulnerability?
Should you panic about the recently disclosed DROWN SSL vulnerability? Is it cute and kid-friendly, or is it a monster vulnerability coming to expose your most sensitive data?
The DROWN announcement was done the right way:
read more
Sophisticated USB Trojan Spotted in the Wild
Researchers at ESET have discovered a sophisticated data-stealing USB Trojan that leaves no trace on the compromised system and includes a self-protection mechanism that makes it difficult to detect, copy and analyze.
read more


