Popular ISP utility exposed to new cache poisoning attack. Squison is the name of a recently discovered security bug in the Squid proxy...
Silk Road makes another appearance, but will it last? A new instance of the infamous Silk Road marketplace has popped up on the...
RECENT HEADLINES WARN that the government now has greater authority to hack your computers, in and outside the US. Changes to federal...
GhostShell, the Romanian hacker who recently revealed his true identity in a very candid exposé, has returned to the world of hacking...
A Trojan for Android designed to steal user login credentials needed to access online banking programs and to steal money from victims’...
Short Bytes: After seven release candidates, the Linux 4.6 kernel was officially released by Linus Torvalds on May 15. As the third...
Apple has removed a security App from its app store claiming it’s misleading and confusing for users — The app was developed...
Good news for The Pirate Bay fans — Though The Pirate Bay’s .SE domain is now a thing of past, the .org domain...
Short Bytes: Long before Linus Torvalds wrote Linux, Microsoft was the king of Unix world. The company, somehow, developed Xenix, the most...
Short Bytes: As a result of last year’s announcement that Italian Ministry of Defence will ditch Microsoft’s Office suite and adopt open...
Anonymous OpIcarus is underway and the new targets include banking sites in France, UAE, Philippine, Tunisia, Trinidad and Tobago! It looks like the online...
In a modern technology case of do not judge a book by its cover, a Philadelphia police surveillance van designed as a...
Short Bytes: Red Hat recently announced the latest iteration of its widely popular enterprise Linux — Red Hat Enterprise Linux 6.8. This release comes with...
CJExploiter is drag and drop ClickJacking exploit development assistance tool. First open the “index.html” with your browser locally and enter target URL...
First of all your iPhone must be jailbroken before you can use Cydia to make iPhone apps work on Linux. Log on...
Short Bytes: After releasing dedicated chat and radio apps, ISIS has released their first app directed specifically at children. This app aims...
RANSOMWARE IS A multi-million-dollar crime operation that strikes everyone from hospitals to police departments to online casinos. It’s such a profitable scheme...
Marco Rubio Memes flash on 2 Alabama billboards after apparent hack. Alabama citizens may have had the fright of of their life...
Short Bytes: Ever imagined how your picture will “sound” if converted into music? Now, using a new Chrome Experiment called PixelSynth, you...
Proofpoint researchers have recently observed the re-emergence of two malware downloaders that had largely disappeared for several months. Hancitor (also known as...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage