Los Angeles hospital paid hackers $17,000 ransom in Bitcoins to decrypt medical records. We had earlier reported that hackers had infected the Hollywood Presbyterian...
Apple is the latest in a host of technology players to be requested to allow exceptional access, that is, access in exceptional...
Banking trojans, like ransomware, have become big business today. And the people behind all of these malicious products are always moving forward,...
Comodo Internet Security, in the default configuration, installs an application called GeekBuddy that also installs a VNC server enabled by default. The hackers...
If you receive a mail masquerading as a company’s invoice and containing a Microsoft Word file, think twice before clicking on it....
Short Bytes: IoT (Internet of Things) is going to get a major boost in the coming years. 48 hours ago, the Linux...
Millions of spam emails spread new ransomware variant on the day it first appeared. A new variant of ransomware known as Locky...
Short Bytes: “Cybersecurity legend” John McAfee has bashed the policies of American government’s stance on encryption. Taking Apple’s side, McAfee has offered FBI...
Disney Cruise Ship Rescues Anonymous-associated Hacker and Hands him over to the FBI. The twists and turns of fate are hard to...
Short Bytes: The Cupertino-based company was asked by the US court to unlock the Syed Rizwan Farook’s iPhone 5C which the FBI...
Researchers at Blue Frost Security firm discovered a flaw in the FireEye Virtual Execution Engine (VXE) that allows an attacker to completely...
Google Stands with Apple on the Encryption Issue — Yes, this is Big and this comes as a Surprise no doubt! The...
Short Bytes: Alex Gibney is known for his investigative documentaries that garner a unanimous applause from the critics. During the reporting for his...
Countless movies feature hackers remotely turning off security systems in order to infiltrate buildings without being noticed. But how realistic are these...
A unique survey among threat experts has revealed that most cyberattacks against a typical IT infrastructure take less than 24 hours to...
We first disclosed that the WordPress pingback method was being misused to perform massive layer 7 Distributed Denial of Service (DDoS) attacks back in...
Short Bytes: Martin Gottesfeld, the alleged Anonymous hacker responsible for 2014’s hacking attack at Boston Children’s Hospital, has been arrested by the FBI....
A new vulnerability in the AirDroid App was revealed by Check Point. This vulnerability affects the 50 million AirDroid users around the...
ShortBytes: In response to the Federal court order which was issued to Apple, the maker of iPhone, to help the FBI hack...
Custom version of iOS could undo years of work Apple put into securing iPhones. Tuesday’s court order compelling Apple to hack the iPhone...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage