Security researchers at Microsoft have released details of a new widespread campaign distributing an infamous piece of fileless malware that was primarily...
Security researchers have found that 11.2 million cyber-attacks hit organizations in Kenya in the first quarter of 2019, this is a 10.1...
An unknown hacker yesterday successfully managed to hack into the official GitHub account of Canonical, the company behind the Ubuntu Linux project...
A 23-year-old hacker from Utah who launched a series of DDoS attacks against multiple online services, websites, and online gaming companies between...
In the last two weeks, Florida has paid more than $1.1 million in bitcoin to cybercriminals to recover encrypted files from two...
Important Update (21 June 2019) ➤ The Tor Project on Friday released second update (Tor Browser 8.5.3) for its privacy web-browser that patches...
Cybersecurity isn’t easy. If there was a product or service you could buy that would just magically solve all of your cybersecurity...
Paraguay, Chile, Brazil, Uruguay, and Argentina are having country-wide power outages since June 16, 2019, 7:07 am Argentina time. Labeled by Argentinian...
Researchers discovered a new security vulnerability that affects the confidentiality of data stored in computer memory. This enabled them to successfully extract...
Cyber attacks are executed via the internet mostly for political or social reasons. These attacks target the general public or corporate and...
Chinese hackers and secretly exploited more than 50,000 MS-SQL and PHPMyAdmin for TurtleCoin as part of a large-scale crypto hacking campaign called...
WannaCry, a malicious computer virus that encrypts data and demands ransom, hit thousands of computers across the world, causing several organization to...
The New Zealand Financial Innovation & Technology Association (FinTechNZ), a financial-technology organization has exposed the alarming situation of companies based on New...
Justice, Israel style, the final judgment of Israeli Defense Force (IDF) against cyber attackers was decisive and literally with the “bang”. The...
The U.S. Department of Homeland Security (DHS) and the FBI have issued another joint alert about a new piece of malware that...
The Israel Defense Force (IDF) claims to have neutralized an “attempted” cyber attack by launching airstrikes on a building in Gaza Strip...
ATO (Account Takeover) attacks have reportedly impacted roughly 4,000 Office 365 accounts, which were later used to carry out malicious activities. Details...
Taking advantage of newly disclosed and even patched vulnerabilities has become common among cybercriminals, which makes it one of the primary attack...
Anyone who is on the internet is vulnerable to cyber attacks. Today, we depend on the internet for all kinds of things,...
Once again Toyota Motor Corporation reported its second data breach. The first attack was in February, and it’s not clear whether the...
What is a Man-in-the-Middle (MITM) Attacks – Definition MITM attack refers to the kind of cyberattack in which an attacker eavesdrops on...