• img May 31, 2017

Hack Department of Homeland Security Act Would Bring Bug Bounty Program to DHS

Hackers will soon be able to poke holes in networks and systems belonging to the Department of Homeland Security if four senators get their way and a bill is passed that would institute a DHS bug bounty similar to programs recently implemented for the Army, Air Force and Pentagon. The bill, known as the Hack Department of […]

Read More
  • img May 31, 2017

Hackers blackmail patients of cosmetic surgery clinic

Hackers have been trying to blackmail patients of a Lithuanian plastic surgery clinic, by threatening to publish their nude “before and after” photos online. The breach and the leak The photos were stolen earlier this year, along with other sensitive data – passport scans, national insurance numbers, etc. – from the servers of Grozio Chirurgija, […]

Read More
  • img May 31, 2017

Patches Available for Linux Sudo Vulnerability

Red Hat, Debian and other Linux distributions yesterday pushed out patches for a high-severity vulnerability in sudo that could be abused by a local attacker to gain root privileges. Sudo is a program for Linux and UNIX systems that allows standard users to run specific commands as a superuser, such as adding users or performing […]

Read More
  • img May 31, 2017

Cisco, Netgear Readying Patches for Samba Vulnerability

Device manufacturers are combing through code again this week to determine whether their products are affected by a vulnerability tied to the SMB file-sharing protocol. The vulnerability, (CVE-2017-7494) disclosed last Wednesday, affects versions of 3.5.0 onward of Samba, the free software re-implementation of the SMB/CIFS networking protocol. If exploited, the bug could allow authenticated attackers […]

Read More
  • img May 31, 2017

New Machine Learning Behind Early Phishing Detection in Gmail

Cybercrime and state-sponsored advanced attacks continue to cling to email as a primary distribution vehicle for first-stage malware. Phishing campaigns thrive in targeted attacks, and criminals have even resuscitated old-school macro malware in attachments to gain that initial foothold on a victim’s computer. Google, still stinging from a massive Google Docs-centered phishing campaign during the […]

Read More