Attackers exploit eBay’s lackluster security policy. The JSF*** XSS bug that cyber-security firm Check Point discovered two weeks ago is being used in...
Phishing scheme gained illegal access to accounts storing 161 nude images. An Oregon man has admitted he tricked hundreds of people into divulging...
iOS users take on Android while Android users criticize Apple — But which OS is actually secure? It is a fact that...
Al-Qeeq’s Detention Enrages Anonymous- Widespread DDoS Campaigns Planned Against Israel Army The online hacktivist Anonymous is known for targeting Israeli cyberspace including government,...
It takes nothing to go so low and kill a beautiful creature of nature for the sake of fun Suppose you are...
Protect your iPhone from the clutches of the FBI by switching to longer passcodes The on-going tussle between the FBI and Apple...
It's said that the biggest vulnerabilities in a network environment are its users. If only there was a way to control those...
Los Angeles hospital paid hackers $17,000 ransom in Bitcoins to decrypt medical records. We had earlier reported that hackers had infected the Hollywood Presbyterian...
Apple is the latest in a host of technology players to be requested to allow exceptional access, that is, access in exceptional...
Banking trojans, like ransomware, have become big business today. And the people behind all of these malicious products are always moving forward,...
Comodo Internet Security, in the default configuration, installs an application called GeekBuddy that also installs a VNC server enabled by default. The hackers...
If you receive a mail masquerading as a company’s invoice and containing a Microsoft Word file, think twice before clicking on it....
Short Bytes: IoT (Internet of Things) is going to get a major boost in the coming years. 48 hours ago, the Linux...
Millions of spam emails spread new ransomware variant on the day it first appeared. A new variant of ransomware known as Locky...
Short Bytes: “Cybersecurity legend” John McAfee has bashed the policies of American government’s stance on encryption. Taking Apple’s side, McAfee has offered FBI...
Disney Cruise Ship Rescues Anonymous-associated Hacker and Hands him over to the FBI. The twists and turns of fate are hard to...
Short Bytes: The Cupertino-based company was asked by the US court to unlock the Syed Rizwan Farook’s iPhone 5C which the FBI...
Researchers at Blue Frost Security firm discovered a flaw in the FireEye Virtual Execution Engine (VXE) that allows an attacker to completely...
Google Stands with Apple on the Encryption Issue — Yes, this is Big and this comes as a Surprise no doubt! The...
Short Bytes: Alex Gibney is known for his investigative documentaries that garner a unanimous applause from the critics. During the reporting for his...
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment
How Safe is Your TinyProxy? Step-by-Step Guide to Exploiting Tinyproxy’s Zero Day Vulnerability
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications