Microsoft security products will begin detecting software containing search protection functions and classifying it as malicious on June 1.
https://threatpost.com/microsoft-to-detect-search-protection-code-as-malware/113027/
Researchers from Core Security were able to exploit a security vulnerability in Windows' group policy -- MS15-011 -- that was patched by Microsoft in February.
https://threatpost.com/researchers-exploit-patched-windows-group-policy-bug/113000/
CareFirst BlueCross BlueShield announced this week that hackers broke into one of its databases and made off with a variety of sensitive customer information.
https://threatpost.com/1-1-million-affected-by-carefirst-bluecross-blueshield-breach/112951/
The Northern District of California has announced the indictment of six Chinese nationals, charging them with theft of trade secrets and economic espionage.
https://threatpost.com/justice-department-charges-six-chinese-nationals-with-insider-theft/112930/
Researchers from ZScaler have uncovered a new scheme where criminals are using malversting to redirect to pages hosting the Magnitude exploit kit and the CryptoWall ransomware.
https://threatpost.com/malvertising-leads-to-magnitude-exploit-kit-ransomware-infection/112894/
Penn State announced that its school of engineering was the victim of a more than two-year long cyberattack perpetuated by advanced persistent threat groups.
https://threatpost.com/penn-state-offline-following-advanced-two-year-cyberattack/112872/
SAP SE has fixed security vulnerabilities in a pair of compression algorithms used by a number of the company's popular business management software programs.
https://threatpost.com/remotely-exploitable-vulnerabilities-in-sap-compression-algorithms/112808/
The Angler exploit kit is pushing yet another new variant of the TeslaCrypt and AlphaCrypt ransomware. It is similar to Cryptolocker but remains unnamed.
https://threatpost.com/angler-exploit-kit-pushing-new-unnamed-ransomware/112751/
The Tor Project is discontinuing its Tor Cloud Project in the face of mounting bugs and a lack of human and financial resources.
https://threatpost.com/tor-cloud-shut-down-amid-lack-of-support/112725/
Apple has issued a series of bulletins for its Safari browser fixing various security vulnerabilities in its WebKit rendering engine.
https://threatpost.com/apple-fixes-webkit-vulnerabilities-in-safari-browser/112670/