Exploit kits: Spring 2018 review
Since our last report on exploit kits, there have been some new developments with the wider adoption of the February Flash zero-day, as well as the inclusion of a new exploit for Internet Explorer.Read More →
Since our last report on exploit kits, there have been some new developments with the wider adoption of the February Flash zero-day, as well as the inclusion of a new exploit for Internet Explorer.Read More →
A failure affecting GnuPG has made some of the most commonly used e-mail encryption programs vulnerable to digital signature falsification. The list of affected programs includes Enigmail and GPGTools. AboutRead More →
A cutting edge technology padlock, operating with fingerprint, can be opened by anyone who has a smartphone, as discovered by information security investigators. On its website, Tapplock is presented asRead More →
Cortana has security vulnerabilities when it operates on the lock screen Microsoft has launched a security update to prevent hackers from entering PC via Cortana, the digital assistant integrated intoRead More →
Another patch has been released with security updates for Adobe Flash Player for Windows, MacOS, Linux and Chrome OS that works on multiple critical vulnerabilities. On June 7, Adobe SecurityRead More →
Recently cryptojacking attacks have been spreading like wildfire. At Imperva we have witnessed it firsthand and even concluded that these attacks hold roughly 90% of all remote code execution attacks inRead More →
40-year-old SS7 is being actively used to track user locations and communications. The US Department of Homeland Security recently warned that malicious hackers may have targeted US phone users byRead More →
With the staggering amount of features that were introduced through HTML5 and CSS3 the attack surface of browsers grew accordingly. Consequently, it is no surprise that interactions between such featuresRead More →
An information security expert explains that, Archery is an open source vulnerability management and evaluation tool that helps developers and evaluators perform scans and manage vulnerabilities. Archery uses open source tools toRead More →
After an investigation, security professionals have found a backdoor account in the firmware of the D-Link DIR-620 routers; this allows malicious actors to take over any device accessible through theRead More →