Brazilian malware continues to evolve day by day, making it increasingly sophisticated. If you want to know how the various malicious programs...
Android.Lockdroid ransomware expands to Asia by targeting Japan first. The malware poses as a system update and locks the device from use. One...
Security researchers from SentinelOne have discovered a security vulnerability affecting the Apple System Integrity Protection (SIP). Security researcher Pedro Vilaça from SentinelOne...
After #OpCanary Anonymous Revives #OpAfrica with Targeting Kenya Petroleum Refineries Limited The online hacktivist Anonymous is seeking to wipe-out evils like child...
The United States Marine Corps has launched on March 25th a new hacker support unit named Marine Corps Cyberspace Warfare Group. It is...
Short Bytes: Ever wished to create your own digital assistant that talks back to you and completes your day-to-day tasks? Now it’s...
Short Bytes: After FBI hacked San Bernardino gunman’s iPhone without Apple’s help, most of us almost thought that Apple was the only company...
A new ransomware called KimcilWare has been discovered that appears to be targeting web sites using the Magento eCommerce solution. It is...
Short Bytes: The TOR Project has expressed its commitment to researching and developing new ways to mitigate the threats of security failure....
Short Bytes: At the first day of Microsoft Build Developer Conference 2016, something amazing happened. Microsoft showed the world how Ubuntu on...
PayPal has just fixed a security vulnerability that could have been exploited to send malicious emails to users via its platform. Researchers at security...
VNC Roulette allows you to randomly view insecure desktops accessible over the internet. Recently, a new website has come up on the Internet,...
Scammers Distribute Malware to Drivers in Pennsylvania using Accurate Speeding Data Scammers and their antics are simply unbelievable. This time, scammers have...
Short Bytes: From the stage of Microsoft Developer Conference 2016, Microsoft once again showed off its love for developers. Redmond announced that GNU project’s...
Short Bytes: A hacker has scanned the web for insecure systems using Virtual Network Computing (VNC) and collected an enormous amount of...
ESET researchers are actively monitoring malware that targets embedded systems such as routers, gateways and wireless access points. We call this new...
Chinese state media is full of praise for the hacker accused of stealing a US F-35 Fighter Plane. A state-run media last Wednesday...
Short Bytes: FBI is pushing back against the order of a judge on revealing the technique it used to catch the defendant in...
Paris terrorists used burner phones and US lawmakers have proposed a bill that would force retailers to record the identity of the buyers...
FBI is fighting back against the federal judge’s order to reveal the Tor Exploit and with DoJ filed a sealed motion requesting...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft