ome users might be able to remove KeRanger before it starts its encryption process and locks up all their files. Yesterday, the first...
Quite a few times, you might need to display Android screen on your PC or Mac to to play games, stream video...
Short Bytes: Using the rich ffmpeg video library written in C, you can make simple media applications. Based on the updated version of...
Insecure configurations expose car telematics to hacking. Industrial vehicles like trailer trucks, delivery vans, or buses that have an Internet connection, can be...
Short Bytes: KeRanger — the world’s first Mac ransomware — has arrived to give you nightmares. Spread via BiTorrent client Transmission, the malware...
ProofPoint uncovered a new cyber espionage campaign dubbed Operation Transparent Tribe targeting Indian diplomatic and military entities. A new cyber espionage campaign...
Someone hijacked the Transmission BitTorrent client project website to spread ransomware to Mac OS X users. Over the weekend, a malicious party has...
Short Bytes: Using the Task Manager, it is not possible to monitor network usage in Windows 10 as it only shows the...
TeaMp0isoN is back — This time with a new approach and a new hack TeaMp0isoN, a grey-hat security research collective, managed to...
An increase in the use of technology is making the world more accessible to hackers — In their latest attempt hackers might...
Short Bytes: To answer your security related concerns, Subgraph OS is here as a free, secure, open source Linux operating system for...
Short Bytes: A Reddit user has shared some screenshots that point towards a new feature being tested by Apple. The screenshots show...
The resurgence and continued prevalence of macro malware could be linked to several factors, one of which is their ability to bypass traditional antimalware...
Diplomats and military personnel in India have been victimized in targeted espionage attacks that use a number of means of infection including...
Short Bytes: History of hacking always fascinates us as it tells us about the best hackers from the earlier times. But is...
What’s driving the surge in hidden services—is it government tampering? In recent weeks, the number of “hidden services”—usually Web servers and other Internet...
Last summer we shared a story about the SweetCaptcha WordPress plugin injecting ads and causing malvertising problems for websites that leveraged the plugin....
This PayPal phishing scam tricks users into clicking a fake link and asks for login details — Don’t fall for it! PayPal...
The infamous hacker, popularly known as Segate, Oreon and Predator, has pleaded guilty finally in front of a New York judge. The...
It seems like porn is making America great again Americans usually are deemed as a nation deeply divided over critical issues of...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams