Robocalls: often a scam, usually a nuisance. Do you have to put up with them?
Steam Stealer Malware is becoming a sensation for cyber criminals and it puts 125 million Steam users at risk According to the...
DDoS attacks can have an amplification factor of 26.5. An independent security researcher that goes by the name of MalwareTech has discovered a...
Three years after the Snowden revelations, the proliferation of privacy-focused messaging apps, email clients, and other encryption services hasn’t yet managed to...
Short Bytes: Microsoft has finally rolled out extensions support in its Edge web browser. At the moment it’s available for Windows Insiders...
During our continued efforts to protect our customers against the latest mobile threats, we came across another malicious app that used pornography...
Crook hijacks iCloud account, locks victim’s Mac.Crooks have discovered a method of turning Apple’s security features against the company’s users, hijacking Apple...
New research finds “bitflipping” attacks may pose more risk than many admit. Physical weaknesses in memory chips that make computers and servers susceptible...
Do you consider non-jailbroken iPhones to be safe? Think again! AceDeceiver is playing havoc with Apple’s most celebrated devices. This malware has...
A not so new bug called Stagefright, that affects Android devices has been discovered by security researchers. The bug leaves millions of...
Short Bytes: The results of Stack Overflow Developer Survey 2016 is out. Based on the response of 56,033 developers, we are able...
Internet Connected Sex Toys Vulnerable to Hacking — Hackers can not only remotely control smart sex toys but also record videos and...
Short Bytes: The development of the bytecode named WebAssembly was coined last year which led to the formation of the Web Assembly...
Security researchers 2, Radamant coder 0.Researchers from InfoArmor, an Arizona-based cyber-security firm, have discovered an SQL injection flaw in the control panel...
Short Bytes: A remote Android hacking exploit named Stagefright — also known as Metaphor — has arrived and because of it, millions...
Security researchers have successfully exploited the Android-based Stagefright bug and remotely hacked a phone, which may leave millions devices vulnerable to attack....
A kernel bug in Snapdragon chips may make billions of Android devices susceptible to hacks.A report from The Hacker News has shed...
We’ve discovered a new family of iOS malware that successfully infected non-jailbroken devices we’ve named “AceDeceiver”. What makes AceDeceiver different from previous iOS...
Legitimate code-signing certificates provide secret cover for attack groups. There are lots of ways to ensure the success of an advanced hacking operation....
Mainstream Websites including AOL, BBC and The New York Times Become Targets of Malvertising A number of popular, high-profile websites have become...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams