Department of Defense Partners With HackerOne on First Federal Government Bug Bounty Program
Earlier this month, the Department of Defense (DoD) announced "Hack the Pentagon," a new bug bounty program that will award security researchers who can discover vulnerabilities on the Pentagon's public web pages.
read more
Petya Ramsomware Performs Two-Step Encryption
Petya, the ransomware family recently discovered to encrypt entire hard disks, performs a two-phase encryption process, researchers have discovered.
read more
“KimcilWare” Ransomware Targets Magento Websites
A new piece of ransomware apparently designed to encrypt files on websites running the popular Magento ecommerce solution has been spotted in the wild.
The threat, dubbed “KimcilWare,” has been analyzed by researchers of the Malware Hunter Team and Lawrence Abrams of Bleeping Computer.
read more
Attackers Can Install Malware on iOS via MDM Solutions
Researchers have discovered a method that can be used to install malware on iOS devices by abusing the mobile device management (MDM) solutions used by many enterprises.
read more
Cyber Situational Awareness and the Kill Chain
read more
Continue readingPhilippines Can Recover Big Chunk of Stolen Bangladesh Millions: MP
Almost half of the $81 million that hackers stole from Bangladesh and funneled into Philippine casinos can still be recovered, a senior Filipino lawmaker investigating the audacious cyber heist said Thursday.
read more
Malware Detection Bypass Vulnerability Found in Cisco Firepower
Cisco has released software updates to patch a high severity vulnerability that allows remote attackers to bypass the malware detection and blocking feature in the Firepower System Software.
read more
TrendMicro Left Remote Debug Server Running on Customer Systems
Command Execution Flaw Patched in Trend Micro Products
Trend Micro released patches on Wednesday to address a serious vulnerability affecting several of the company’s products.
read more
New Remaiten Malware Builds Botnet of Linux-Based Routers
Remaiten Linux Bot Targets Routers and Potentially Other Embedded (IoT) Devices
A new piece of malware is targeting embedded systems with the mission to compromise and make them part of a botnet, ESET security researchers have discovered.
read more
Security Flaw in Truecaller Exposes Millions of Android Users
Popular phone call management application Truecaller was discovered to pack a remotely exploitable security flaw that potentially impacts 100 million Android users, researchers at Cheetah Mobile Security Research Lab warn.
read more


