Information security and privacy are consistently hot topics after Edward Snowden revelations of NSA’s global surveillance that brought the world’s attention towards...
Short Bytes: A recent report by the cyber security firm Rapid7 lists the top usernames and passwords used by hackers to attack...
Cerber ransomware distributed as a Raas service. The latest addition to the ransomware spectrum is a new threat called Cerber that encrypts users...
Researcher-devised exploit threatens Bitcoin wallets and other high-value assets. Researchers have devised an attack on Android and iOS devices that successfully steals cryptographic...
Short Bytes: There’s a new programming language in town and it’s the happiest language you’ll ever meet. Emojicode, an open source and...
Short Bytes: All it took was a crying baby (not a real one but in the background on YouTube) and some empathetic...
Hacking with Kali Linux on your android device, hacking becomes much easier since you have all the tools (more than 300 pre-installed tools)...
A group of researchers that analyzed security of a number of smart watches discovered a $17 smartwatch is sold with a backdoor...
Sea pirates hire hacker to break into shipping company’s CMS. A curious case reported by Verizon’s RISK Team shows that even those lowly...
Short Bytes: The US Department of Defense’s new division Defense Digital Service (DDS) is launching a new pilot program called Hack the...
WinRT PDF exposes users to drive-by attacks. WinRT PDF, the default PDF reader for Windows 10, opens Edge users to a new series...
Hack the Pentagon – DoD would invite outside hackers to test the cybersecurity of some public US Defense Department resources as part...
The Pentagon is asking hackers to come and hack into their systems — No, you won’t go to jail for it The...
Short Bytes: After installing a major update or newer builds, users are reporting issues of losing programs in Windows 10. While Microsoft...
Short Bytes: It seems that potential hackers are taking more interest in open source malware codes these days because they are easily available....
Short Bytes: This is the first time when the US has announced an open cyber attack. The cyber attack on ISIS will...
Locky is a new ransomware that has been released (most probably) by the Dridex gang (source). Not surprisingly, it is well prepared,...
Short Bytes: On Tuesday, FBI Director James Comey appeared before the House Judiciary Committee and defended FBI’s demands for unlocking the iPhone of the...
Short Bytes: Brazilian police have arrested Diego Dzodan, Facebook’s Latin American regional vice-president, for failing to provide WhatsApp messages related to a case...
Spam campaign baits users with Visa Total Rewards emails containing malware that leads to Trojan.Cryptolocker.N infections. Spam related to credit cards is a...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment