Short Bytes: KeRanger — the world’s first Mac ransomware — has arrived to give you nightmares. Spread via BiTorrent client Transmission, the malware...
ProofPoint uncovered a new cyber espionage campaign dubbed Operation Transparent Tribe targeting Indian diplomatic and military entities. A new cyber espionage campaign...
Someone hijacked the Transmission BitTorrent client project website to spread ransomware to Mac OS X users. Over the weekend, a malicious party has...
Short Bytes: Using the Task Manager, it is not possible to monitor network usage in Windows 10 as it only shows the...
TeaMp0isoN is back — This time with a new approach and a new hack TeaMp0isoN, a grey-hat security research collective, managed to...
An increase in the use of technology is making the world more accessible to hackers — In their latest attempt hackers might...
Short Bytes: To answer your security related concerns, Subgraph OS is here as a free, secure, open source Linux operating system for...
Short Bytes: A Reddit user has shared some screenshots that point towards a new feature being tested by Apple. The screenshots show...
The resurgence and continued prevalence of macro malware could be linked to several factors, one of which is their ability to bypass traditional antimalware...
Diplomats and military personnel in India have been victimized in targeted espionage attacks that use a number of means of infection including...
Short Bytes: History of hacking always fascinates us as it tells us about the best hackers from the earlier times. But is...
What’s driving the surge in hidden services—is it government tampering? In recent weeks, the number of “hidden services”—usually Web servers and other Internet...
Last summer we shared a story about the SweetCaptcha WordPress plugin injecting ads and causing malvertising problems for websites that leveraged the plugin....
This PayPal phishing scam tricks users into clicking a fake link and asks for login details — Don’t fall for it! PayPal...
The infamous hacker, popularly known as Segate, Oreon and Predator, has pleaded guilty finally in front of a New York judge. The...
It seems like porn is making America great again Americans usually are deemed as a nation deeply divided over critical issues of...
A security researcher “hacker” has reportedly found a way to hijack a high-end drone using parts assembled to the tune of $40....
Short Bytes: To make your Windows 10 PC experience more secure, Microsoft is launching a new service called Windows Defender Advanced Threat...
Researchers at threat defense company Skycure have uncovered an Android proof of concept malware that uses accessibility services to allow attackers to...
This post was written by Marek Vavruša and Jaime Cochran, who found out they were both independently working on the same glibc...
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files
Iranian MuddyWater Hackers Adopt New C2 Tool ‘DarkBeatC2’ in Latest Campaign
Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack
Sneaky Credit Card Skimmer Disguised as Harmless Facebook Tracker
U.S. Federal Agencies Ordered to Hunt for Signs of Microsoft Breach and Mitigate Risks
TA547 Phishing Attack Hits German Firms with Rhadamanthys Stealer
Python’s PyPI Reveals Its Secrets