While you might think that what a Russian APT group does to attack Ukrainian infrastructure has little to do with the life...
Short Bytes: DARPA, the organization which once invented stealth plane and the Internet, is apprehensive of the fatal weaponry’s which are being...
Short Bytes: According to the latest round of rumors in the Linux community, Nvidia is busy making its own gaming-optimized Linux distro...
Robocalls: often a scam, usually a nuisance. Do you have to put up with them?
Steam Stealer Malware is becoming a sensation for cyber criminals and it puts 125 million Steam users at risk According to the...
DDoS attacks can have an amplification factor of 26.5. An independent security researcher that goes by the name of MalwareTech has discovered a...
Three years after the Snowden revelations, the proliferation of privacy-focused messaging apps, email clients, and other encryption services hasn’t yet managed to...
Short Bytes: Microsoft has finally rolled out extensions support in its Edge web browser. At the moment it’s available for Windows Insiders...
During our continued efforts to protect our customers against the latest mobile threats, we came across another malicious app that used pornography...
Crook hijacks iCloud account, locks victim’s Mac.Crooks have discovered a method of turning Apple’s security features against the company’s users, hijacking Apple...
New research finds “bitflipping” attacks may pose more risk than many admit. Physical weaknesses in memory chips that make computers and servers susceptible...
Do you consider non-jailbroken iPhones to be safe? Think again! AceDeceiver is playing havoc with Apple’s most celebrated devices. This malware has...
A not so new bug called Stagefright, that affects Android devices has been discovered by security researchers. The bug leaves millions of...
Short Bytes: The results of Stack Overflow Developer Survey 2016 is out. Based on the response of 56,033 developers, we are able...
Internet Connected Sex Toys Vulnerable to Hacking — Hackers can not only remotely control smart sex toys but also record videos and...
Short Bytes: The development of the bytecode named WebAssembly was coined last year which led to the formation of the Web Assembly...
Security researchers 2, Radamant coder 0.Researchers from InfoArmor, an Arizona-based cyber-security firm, have discovered an SQL injection flaw in the control panel...
Short Bytes: A remote Android hacking exploit named Stagefright — also known as Metaphor — has arrived and because of it, millions...
Security researchers have successfully exploited the Android-based Stagefright bug and remotely hacked a phone, which may leave millions devices vulnerable to attack....
A kernel bug in Snapdragon chips may make billions of Android devices susceptible to hacks.A report from The Hacker News has shed...
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
Compromising Cryptographic Key Security Through PuTTY: A Deep Dive into CVE-2024-31497
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
FTC Fines Mental Health Startup Cerebral $7 Million for Major Privacy Violations
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks
Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files