The Bash vulnerability was reportedly already being exploited in the wild, only several hours after news first broke out. At least one sampled malware is capable of launching distributed denial-of-service (DDoS) attacks.
A serious vulnerability has been found in the Bash command shell commonly used by most Linux distributions. This vulnerability allows an attacker to run commands, such as remote code execution, on an affected system.
Certain versions of Google Wallet and Alipay in-app payment SDKs contain a vulnerability that could allow phishing attacks. Our analysis of the two SDKs describes the vulnerability in detail.
Mobile malware continues to rise and vary - ransomware and bitcoin-mining malware emerge. Vulnerabilities in Android abound. Our review of the first half of 2014 reveals these results.
Trend Micro research shows that almost all Netis/Netcore routers have an open port that allows a knowledgeable attacker to exploit your computer and network. It may be time to replace your router.
FlashPack exploit kits that affected more than 60K Japanese users were found to be delivered via a compromised website add-on. The tool adds social media sharing buttons on a webpage that may lead to an Adobe Flash exploit.
Arbitrary code execution - this is the end-result if your Internet Explorer and Windows Media Center are not updated with the August security patches from Microsoft.