Short Bytes: KeRanger — the world’s first Mac ransomware — has arrived to give you nightmares. Spread via BiTorrent client Transmission, the malware...
ProofPoint uncovered a new cyber espionage campaign dubbed Operation Transparent Tribe targeting Indian diplomatic and military entities. A new cyber espionage campaign...
Someone hijacked the Transmission BitTorrent client project website to spread ransomware to Mac OS X users. Over the weekend, a malicious party has...
Short Bytes: Using the Task Manager, it is not possible to monitor network usage in Windows 10 as it only shows the...
TeaMp0isoN is back — This time with a new approach and a new hack TeaMp0isoN, a grey-hat security research collective, managed to...
An increase in the use of technology is making the world more accessible to hackers — In their latest attempt hackers might...
Short Bytes: To answer your security related concerns, Subgraph OS is here as a free, secure, open source Linux operating system for...
Short Bytes: A Reddit user has shared some screenshots that point towards a new feature being tested by Apple. The screenshots show...
The resurgence and continued prevalence of macro malware could be linked to several factors, one of which is their ability to bypass traditional antimalware...
Diplomats and military personnel in India have been victimized in targeted espionage attacks that use a number of means of infection including...
Short Bytes: History of hacking always fascinates us as it tells us about the best hackers from the earlier times. But is...
What’s driving the surge in hidden services—is it government tampering? In recent weeks, the number of “hidden services”—usually Web servers and other Internet...
Last summer we shared a story about the SweetCaptcha WordPress plugin injecting ads and causing malvertising problems for websites that leveraged the plugin....
This PayPal phishing scam tricks users into clicking a fake link and asks for login details — Don’t fall for it! PayPal...
The infamous hacker, popularly known as Segate, Oreon and Predator, has pleaded guilty finally in front of a New York judge. The...
It seems like porn is making America great again Americans usually are deemed as a nation deeply divided over critical issues of...
A security researcher “hacker” has reportedly found a way to hijack a high-end drone using parts assembled to the tune of $40....
Short Bytes: To make your Windows 10 PC experience more secure, Microsoft is launching a new service called Windows Defender Advanced Threat...
Researchers at threat defense company Skycure have uncovered an Android proof of concept malware that uses accessibility services to allow attackers to...
This post was written by Marek Vavruša and Jaime Cochran, who found out they were both independently working on the same glibc...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment