Trojan targets CMS platforms running on Linux servers. What initially looked like a string of Drupal sites infected with ransomware (that didn’t work...
A new ransomware called DetoxCrypto has been discovered by MalwareHunterTeam that is currently being distributed under two different variants. The first variant looks...
Bitcoin traders have been warned that the upcoming Bitcoin Core software release will become a top target for well-funded hacking groups. Bitcoin.org...
Palo Alto Networks has identified a malware family known as ‘Aveo’ that is being used to target Japanese speaking users. The ‘Aveo’...
A data breach at 20 U.S. hotels operated by HEI Hotels & Resorts for Starwood, Marriott, Hyatt and Intercontinental may have divulged...
ANONYMOUS POLAND HACKED WORLD ANTI-DOPING AGENCY AND COURT OF ARBITRATION FOR SPORT’S SERVERS’ SERVER AND LEAKED PERSONAL DETAILS FOR GOD KNOWS WHAT REASON!...
With the threat of ransomware hanging over every company’s head, does it make sense for companies to stockpile a few bitcoins in the...
Scammers are hacking Instagram accounts and altering profiles with sexually suggestive imagery to lure users to adult dating and porn spam. Earlier...
A Russian organized cybercrime group known for hacking into banks and retailers appears to have breached hundreds of computer systems at software giant...
Love Hack : Man hacks Tinder App’s ‘swipe right’ feature to send introductions to 200,000 women Hacking is mostly done to either...
F-Secure researchers say parties involved in the South China Sea arbitration case were infected with the data-stealing NanHaiShu Trojan. Hackers have used...
Bitcoin exchange platform Bitfinex is reporting the theft of what some users are saying is as much as 119,756btc — or about...
It’s no secret hotel rooms can be hacked into. One security researcher has now created a cheap, discrete device the size of a card...
Macros have been used since the mid 1990s to spread malware and infect systems. Increased user awareness of the need to disable...
Attack from the ’90s resurfaces more deadly than before. A flaw in how Windows handles old authentication procedures for shared network resources can...
A hacker using the pseudonym “Peace” has uploaded what purports to be a data dump of 200 million Yahoo accounts to an...
While many email providers, clients, and anti-spam engines have become adept at detecting spam, malicious messages sent via high-profile, legitimate providers are...
Fueled by the lack of Pokémon GO in Brazil, a hacker group called OurMine took control of Niantic CEO John Hanke’s Twitter...
Israeli experts discovered a vulnerability within the JavaScript that proxy PAC files that allows HTTPS URLs interception via Proxy Attacks. Israeli security...
GCHQ’s JTRIG team targeted more than hacktivists. Mustafa Al-Bassam, aka tFlow, co-founder of the LulzSec hacking crew, published today more details about how...
Scammers exploit the recent a wave of attacks to trick victims with phishing offensive and steal sensitive data from the unaware users....