For full functionality of this site it is necessary to enable JavaScript. Here are the instructions how to enable JavaScript in your web browser.


Not a member yet? Register now and get started.

lock and key

Sign in to your account.

Account Login


Researchers find out New Linux Backdoor

Security researchers from a Russian Anti-malware company, have detected a new backdoor dubbed Linux.BackDoor.Dklkt.1 that targets Linux operating systems. However, the signature of the backdoor has been added to virus databases. So, its Linux users are under reliable protection. The researchers have claimed that backdoor is supposedly of Chinese origin. They have said that the […]


49 busted in Europe for Man-in-the-Middle bank attacks

A multination bust on Tuesday nabbed 49 suspects spread throughout Europe. They were arrested on suspicion of using Man-in-the-Middle (MiTM) attacks to sniff out and intercept payment requests from email. As Europol detailed in a statement, the raid was coordinated by Europol’s European Cybercrime Centre (EC3) and Eurojust, led by Italian Polizia di Stato (Postal […]


Venom Vulnerability Exposes Most Data Centers to Cyber Attacks

A security researcher disclosed the vulnerability in the virtual Floppy Drive Code used by many computer virtualization platforms. Vulnerability VENOM, attacker can easily escape from the confines of virtual machine guest and exploit the code-execution access to the host. This may result in elevated access to the host’s local network and adjacent systems. By exploiting […]


AnubisNetworks Aids Europol’s European Cybercrime Centre in Takedown of Malicious Botnet

AnubisNetworks, a subsidiary of Security Ratings company BitSight Technologies, today announced its participation in a major botnet takedown operation led by Europol’s European Cybercrime Centre (EC3). The operation involved investigators from around the world and sought to dismantle the Ramnit botnet that infected 3.2 million computers internationally. Criminals used the Ramnit botnet to gain remote […]


Critical GHOST vulnerability affects most Linux Systems

A highly critical vulnerability has been unearthed in the GNU C Library (glibc), a widely used component of most Linux distributions, that could allow attackers to execute malicious code on servers and remotely gain control of Linux machines. The vulnerability, dubbed “GHOST” and assigned CVE-2015-0235, was discovered and disclosed by the security researchers on Tuesday. […]


AirHopper — Hacking Into an Isolated Computer Using FM Radio Signals

In order to secure sensitive information such as Finance or business data many companies and government agencies generally use totally secure computer systems by making sure it aren’t connected to any network at all. But the most secure systems aren’t safe anymore. Security researchers have found a way to snoop on a personal computer even […]


New Variant of Havex Malware Scans for OPC Servers at SCADA Systems

At the beginning of the month, the new surge of a Stuxnet-like malware “Havex”, which was previously targeting organizations in the energy sector, had been used to carry out industrial espionage against a number of companies in Europe and compromised over 1,000 European and North American energy firms. Recently, researchers have discovered a new variant […]


Harkonnen Operation — Malware Campaign

A huge data-stealing cyber espionage campaign that targeted Banks, Corporations and Governments in Germany, Switzerland, and Austria for 12 years, has finally come for probably the longest-lived online malware operation in history. The campaign is dubbed as ‘Harkonnen Operation‘ and involved more than 800 registered front companies in the UK — all using the same […]


SIEM for one, SIEM for all

IT security is not a luxury; it’s a necessity. While IT practitioners understand this and are on the lookout for effective security options for their network, security solutions manufacturers tend to serve the enterprise market and large companies more than they do smaller organizations and resource-constrained security teams. The reality is that 99% of IT […]