Here we will discuss how to hack Facebook, as well as to develop understanding of how fake web pages are created, so...
Short Bytes: Apple has finally brought its Swift programming language to Linux. At this moment, this open source programming language supports Ubuntu...
Short Bytes: GNOME 3.20 Delhi is finally released with many improvements in Web, Maps, Software, and other applications. Read more to know...
A new ransomware has been discovered by security researcher Yonathan Klijnsma called Maktub Locker that shows the most attention to detail that I have...
Hackers reportedly stole the records of 1.5 million customers of Verizon Enterprise which are offered for sale in the criminal underground. According...
Petya uses old-school ransomware tactics, seems to be doing fine without employing powerful encryption. Malware experts from German security firm G DATA have...
Researchers say that wireless mouse could expose billions of computers to hacking Bastille Networks, a startup cyber security company that looks to better...
US authorities announced charges against seven Iranian hackers for attacking computer systems atUS authorities announced charges against seven Iranian hackers for attacking...
The Jerusalem Post reports that the Palestinian Islamic Jihad (PIJ) movement’s main, expert hacker has been indicted by an Israeli judge. The...
The IT systems of three US hospitals have been infected with ransomware, which encrypts vital files and demands money to unlock them....
A chatbot developed by Microsoft has gone rogue on Twitter, swearing and making racist remarks and inflammatory political statements. The experimental AI,...
A unique data-stealing trojan has been spotted on USB devices in the wild – and it is different from typical data-stealing malware. Each...
Apple is a company that has maintained and reinforced the statement over and over again that it takes consumer privacy very seriously...
Pakistan-Linked Hackers Successfully Conduct Third Cyber-Espionage Campaign Against Indian Military within a Month Operation C-Major is the name of the latest cyber-espionage...
Short Bytes: Canonical has unveiled the official mascot of Ubuntu 16.04 Xenial Xerus. The next version of the open-source operating system is...
Short Bytes: Security researchers have identified a new malware named USB Thief that has the ability to steal data from air-gapped computers without leaving...
FBI Adds three Syrian Electronic Army Members to its Cyber’s Most Wanted List and Charges Three for Hacking The three members of...
ESET has discovered a new USB-based data stealer capable of stealthy attacks against air-gapped systems – it is also well-protected against detection...
A unique data-stealing trojan has been spotted on USB devices in the wild – and it is different from typical data-stealing malware,...
How-to guide also included, showing sysadmins how to protect their enterprises from malicious macro malware. Microsoft is finally addressing the elephant in the...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft