An Iranian cyberattack campaign dubbed Operation Cleaver compromised over 50 organizations worldwide, researchers from Cylance said
The group reportedly hijacked the DNS settings for Gigya, a customer management platform
The backdoor script is distributed through pirated plug-ins and themes for WorPress, Joomla and Drupal
The vulnerabilities allow remote attackers to extract files from WinCC SCADA servers and execute arbitrary code on them
Researchers found a new malware program that can steal information from a large number of point-of-sale systems
Researchers found digitally signed spyware posing as a legitimate program called Outertech Linkman
Bitdefender BOX can replace or run alongside a home router to scan all network traffic for security threats
Running the 'less' Linux command on files downloaded from the Internet is dangerous, a researcher says.
The vulnerabilities could allow attackers to create administrator accounts and take control of websites
A new Citadel configuration steals the master keys for two password managers and a secure authentication program
The tool is a joint project of multiple privacy groups who investigated malware used to target journalists and human rights activists.
The 'NotCompatible' Android Trojan now uses peer-to-peer encrypted communication, researchers from Lookout said
The cryptographic implementation is solid and cannot be compromsied through a remote server, the company said
The new CA is called Let's Encrypt and its goal is to encourage the widespread adoption of SSL/TLS on the Internet
Cybercriminals use a popular freebie tactic in an attempt to increase the success rate of its ransomware.