Short Bytes: The big names of American tech industry have expressed their support for Apple in its fight against the government’s demand...
Some Tor servers may leak timezone info via gzipped files. Jose Carlos Norte, developer for the eyeOS virtual desktop project, has discovered an...
Operators running websites based on the WordPress and Joomla must be aware of a spike in the number of compromised platforms used...
The Anon Verdict hacktivists from Anonymous leaked personal information of around 52 Cincinnati Police Department employees on Sunday — Motive: Death of...
Hackers Compromise the Download Link for Linux Mint Deemed to be a “modern, elegant and comfortable operating system which is both powerful and easy to...
Part of the point in presenting small, hack-minded tutorials a la “Edit an Image in Python” or “Send an Email from Python”...
Anonymous launched a series of cyber attacks against government websites of Saudi Arabia to protest the execution of 47 people, including Mr....
GPS hacking has alway been a hot topic on security conferences over the past few years. But the contents are over academic...
Utah state computer systems experiences 300 million hacking attacks a day due to NSA data center in the state. 300,00,000 hacking attempts in...
The Linux Mint website had been hacked, on Saturday, intruders were able to compromise it and serve malicious ISO of Linux Mint...
Using a Public Health Emergency for Malicious Purposes — There’s nothing lower Cybercriminals are nothing but a bunch of lowlives who will...
zANTI is a penetration testing toolkit developed by Zimperium Mobile Security for cyber security professionals. Basically, it allows you to simulate malicious...
Kon-Boot is an application which will silently bypass the authentication process of Windows based operating systems. Without overwriting your old password! In...
The contract between Department of Homeland Security (DHS) and Galois was signed in January. However, HackRead had a chance to discuss the contract...
A group claiming to have connections with Hezbollah says it hacked numerous security cameras in Israel In 2014, Izz al-Din al-Qassam Brigade of Hamas...
Databases can be a treasure trove of confidential data. Normally most databases contain confidential information, private data of companies, people, intellectual property,...
Today when I was checking my Inbox I got this mail from Service Paypal saying that, ” Your account has been limited...
Short Bytes: It’s time to meet the top five billionaires in the technology world. They are the people who have superpowers to change...
A smartphone can take a life and it can also save a life — This time, it has saved a life. Technology has once...
Short Bytes: If you are a coder who is in love with his/her work, then outside weather doesn’t matter much to you....
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files
Iranian MuddyWater Hackers Adopt New C2 Tool ‘DarkBeatC2’ in Latest Campaign
Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack
Sneaky Credit Card Skimmer Disguised as Harmless Facebook Tracker
U.S. Federal Agencies Ordered to Hunt for Signs of Microsoft Breach and Mitigate Risks
TA547 Phishing Attack Hits German Firms with Rhadamanthys Stealer
Python’s PyPI Reveals Its Secrets