Kon-Boot is an application which will silently bypass the authentication process of Windows based operating systems. Without overwriting your old password! In...
The contract between Department of Homeland Security (DHS) and Galois was signed in January. However, HackRead had a chance to discuss the contract...
A group claiming to have connections with Hezbollah says it hacked numerous security cameras in Israel In 2014, Izz al-Din al-Qassam Brigade of Hamas...
Databases can be a treasure trove of confidential data. Normally most databases contain confidential information, private data of companies, people, intellectual property,...
Today when I was checking my Inbox I got this mail from Service Paypal saying that, ” Your account has been limited...
Short Bytes: It’s time to meet the top five billionaires in the technology world. They are the people who have superpowers to change...
A smartphone can take a life and it can also save a life — This time, it has saved a life. Technology has once...
Short Bytes: If you are a coder who is in love with his/her work, then outside weather doesn’t matter much to you....
Are you wondering how to unlock your iPhone so you can use it with another carrier? Then wonder no more! Although initially...
Short Bytes: Codeology is an online visualization program that allows you to see your GitHub project in front of your eyes. Give...
IBM X-Force threat intelligence has found that the source code for Android malware GM Bot was leaked on an underground board in...
SimpliSafe Alarm Systems’ Inherent Vulnerability Exposes Hazards of Wireless Security Devices Digital age has brought along countless blessings and conveniences for the...
NMAP is an essential tool in any hacker’s arsenal. Originally written by Gordon Lyon aka Fydor, it’s used to locate hosts and...
Attackers exploit eBay’s lackluster security policy. The JSF*** XSS bug that cyber-security firm Check Point discovered two weeks ago is being used in...
Phishing scheme gained illegal access to accounts storing 161 nude images. An Oregon man has admitted he tricked hundreds of people into divulging...
iOS users take on Android while Android users criticize Apple — But which OS is actually secure? It is a fact that...
Al-Qeeq’s Detention Enrages Anonymous- Widespread DDoS Campaigns Planned Against Israel Army The online hacktivist Anonymous is known for targeting Israeli cyberspace including government,...
It takes nothing to go so low and kill a beautiful creature of nature for the sake of fun Suppose you are...
Protect your iPhone from the clutches of the FBI by switching to longer passcodes The on-going tussle between the FBI and Apple...
It's said that the biggest vulnerabilities in a network environment are its users. If only there was a way to control those...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage