• October 17, 2014
    A recent investigation revealed that the Sandworm zero day exploit could likely be used to target GE Intelligent Platform CIMPLICITY users. Find out what it does and how you can safeguard your systems against this emerging attack.
  • October 15, 2014
    The term “secure” can only mean so much, especially in the case of the widely-used Secure Sockets Layer (SSL) protocol version 3.0, a 15-year old design Google found to have a major flaw that possibly affects millions of Internet users.
  • October 15, 2014
    A new zero-day exploit that reportedly targets a military organization welcomes Patch Tuesday announcements as Microsoft announces a previously unknown vulnerability on Windows systems. (Update: Patch for "Sandworm" vulnerability has been released.)
  • October 15, 2014
    The breach of investment banking firm JP Morgan Chase has caused the leak of one of the largest number of records to date, reportedly affecting an estimated 76 million households and 7 million small businesses.
  • October 14, 2014
    Microsoft has announced the discovery of a zero-day vulnerability affecting all supported versions of Microsoft Windows and Windows Server 2008 and 2012 that is being used in attacks against NATO and several European industries and sectors.
  • September 28, 2014
    It seems like the floodgates have truly opened for Shellshock-related attacks. Another exploit attack has been detected, targeting a financial institution in China.
  • September 26, 2014
    Shellshock update: more attacks that exploit the Shellshock vulnerability have been detected, including exploit attempts in Brazil that seem to be targeting government institutions.
  • September 26, 2014
    There are new reports that mention incidents of botnet attacks that leveraged Shellshock against certain institutions. A botnet is a network of infected computers/systems.
  • September 26, 2014
    Shortly after the Bash vulnerability known as Shellshock was discovered, we've seen attacks using it to deliver DDoS malware onto Linux systems. Bigger, badder attacks are to be expected. What are some of the other potential scenarios?