November 2, 2017 WordPress Issues Security Patch to Mitigate SQL Injection 2 min read - With its latest update, WordPress patched a vulnerability that could enable malicious plugin and theme developers to execute SQL injection attacks.
November 2, 2017 New Bitcoin Malware Attacks Copy and Paste Their Way to Co-Opted Currency 2 min read - A new set of bitcoin malware attacks known as CryptoShuffler generates income for fraudsters by infecting device clipboards to replace wallet IDs.
October 31, 2017 Windows Vulnerability Puts NTLM Password Hashes at Risk 2 min read - A Colombian security researcher discovered a flaw that could enable attackers to steal Windows NTLM password hashes without any user interaction.
October 31, 2017 Catch-All Google Chrome Extension Conducts Wide-Ranging Data Theft 2 min read - A malicious Google Chrome extension dubbed Catch-All is using a simple phishing scheme to commit data theft against users in Brazil.
October 31, 2017 Photo-Based Pixie 2FA System Takes Authentication to a New Dimension 2 min read - Researchers at Florida International University and Bloomberg have generated a new 2FA system that relies on an individual taking a picture of an object.
October 30, 2017 DUHK Vulnerability Offers a Quick Way to Launch a Crypto Attack 2 min read - Security researchers exposed a vulnerability in a random number generator with hardcoded keys that could lead to a crypto attack.
October 30, 2017 IBM Scholarship Boosts Female Attendance at Hacker Halted Conference 2 min read - IBM sponsored 460 women to attend this year's Hacker Halted conference in an effort to promote inclusion and diversity in the cybersecurity industry.
October 27, 2017 Future-Proof Your Access Management With Single Sign-On: A Lesson From Luxembourg 2 min read - Security professionals need an identity and access management solution that delivers single sign-on capabilities and can adapt to business change.
October 24, 2017 Locky Ransomware Attacks Exploit Microsoft DDE to Increase Effectiveness 2 min read - The cybercriminals behind Locky ransomware have adopted a new DDE hijacking technique to infect as many victims as possible while evading detection.
October 24, 2017 Reaping the Benefit? New Botnet Exploits IoT Security Flaws 2 min read - The new IoT_Reaper botnet has already compromised more than 2 million devices by exploiting existing IoT security flaws.