We first disclosed that the WordPress pingback method was being misused to perform massive layer 7 Distributed Denial of Service (DDoS) attacks back in...
“Active attacker community” often emptied accounts minutes after they went live. Hackers have siphoned about $103,000 out of Bitcoin accounts that were protected...
Hospital staff severely impeded in their day-to-day work. The Hollywood Presbyterian Medical Center, a 430+ beds hospital in the middle of Los Angeles,...
Short Bytes: An attack by a hacker has just revealed the sensitive information of about 20,000 FBI employees. Besides this personal contact...
Banking malware is using techniques once reserved for state-sponsored hacking gangs. To appreciate how malware targeting banks and other financial institutions is...
Another antivirus maker decides to mess around with Chromium default security features and gets it totally wrong. Just two days after Comodo’s...
The reuse of login details on Alibaba’s Taobao has allowed an attack on 5 percent of the accounts on Alibaba’s Chinese retail...
The Comodo app also replaces links and hijacks DNS. Developers have exposed the fact that Comodo Internet Security is actually a security threat...
JSF**k JavaScript library abused to deliver malware. Security researchers have alerted eBay’s staff about a vulnerability in its online platform that lets...
Anonsec group hacked NASA network and released a data dump of data online. The hackers also hijacked a Global Hawk drone. Hackers belonging...
Default Settings In Apache Servers Can Leak Details about Tor traffic. This has happened the second time in this week. Leaving default setting...
Malaysia extradited a hacker charged by DoJ with stealing the personal data of US members and passing it to the ISIS. A...
The British branch of the HSBC bank has suffered for the second time in a month a cyber attack that brought its...
Rare public appearance from Tailored Access Operations leader. USENIX ENIGMA The United States National Security Agency (NSA) is a notoriously secretive organization, but...
According a report from the Nuclear Threat Initiative, numerous nations are not prepared’ to handle the cyber attacks focusing on their nuclear facilities. Numerous...
The Israeli Public Utility Authority is suffering one of the largest cyber attack that the country has experienced, Minister of Infrastructure, Energy...
OpKillingBay – A group of hackers linked to the Anonymous collective shut down the Japanese Airport Website to protest against the slaughter of Dolphin....
Apple has taken a strong stance on privacy ever since the FBI began loudly demanding encryption backdoors into its products. The company’s...
Another educational open-source ransomware project goes bad. Cyber-crooks have used the open-source code of the EDA2 ransomware to create the Magic ransomware...
Attackers are adding unauthorized code at the top of infected websites, over 3,500 8sites already infected. Alarms are ringing in Symantec’s offices,...
Scans for Fortinet devices have intensified. An unknown group has been scanning the Internet for old Fortinet equipment that includes a secret SSH...