The FBI has published a list of tips to reduce the chance of ransomware being the ruin of your company - and...
Short Bytes: In an announcement post, Debian project has revealed that Debian GNU/Linux operating system is dropping support for older 32-bit CPUs....
Backdoors are typically designed to execute cybercriminals’ commands on the infected machine. As a rule, they are used to gain a remote...
Short Bytes: The State police and school district officials in Pennsylvania are investigating a case that involves a school student trying to hack...
Short Bytes: This is a simple and real account of how I prevented 508 resource limit error on my personal blog. How it...
Anonymous and Ghost Squad have conducted another series of cyber attacks on banking websites in Kenya, Panama, Bosnia and Herzegovina — The hacktivists...
Another day another massive data available for sale online — This time, it’s from Fling Adult dating site. Fling.com (NSFW), an adult...
PenQ is an open source Linux based penetration testing browser bundle built over Mozilla Firefox. It comes pre-configured with security tools for...
Pirate Bay Torrent website blocked by Chrome, Safari and Firefox on accounts of phishing. It was a “dark day” for all the...
Short Bytes: The results of a recent survey conducted by the Linux Foundation and Dice.com are out. The survey indicates that the...
New York (AFP) – The founder of an online underworld bank that allegedly laundered billions of dollars for criminals was sentenced Friday...
Short Bytes: If you use Windows AppLocker to restrict others from using some applications and locking down your Windows PC, here’s something...
7ev3n ransomware appeared at the beginning of this year. In addition to typical features of encrypting files, it was blocking access to...
.. but security researchers already cracked it According to security experts from Cylance, in the underground world of ransomware peddlers, there’s no ransomware...
Simple attacks plus user willingness to pay ransoms to get their files back means ransomware is on the rise, warn Kaspersky researchers....
Lenovo Solution Center allowed attackers to get admin access. Lenovo has hid a crucial security update in an old security advisory from last...
The online hacktivist Anonymous and Ghost Squad Attackers are targeting banking websites worldwide for operation OpIcarus. Though they have their difference, when it...
Microsoft will charge you $119 from 29th July 2016 in order to update your operating system from Windows 7 and Win 8...
Pakistani Intelligence Agency ISI is using Smartphone Malware for Spying upon its Military and Security Forces- Claims Indian Government. Pakistan’s intelligence agency...
A few months ago, we reported on a white hack against Dridex where the malicious payload was removed and an Avira antivirus...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams