Short Bytes: When we visit a hospital, we put our complete trust in our doctor and the medical equipment that he/she uses....
The United States Department of Homeland Security had its data leaked online — FBI is forcing websites to remove the data ASAP....
CTB-Locker ransomware spotted on a Linux machine. The website of the British Association for Counseling & Psychotherapy (bacp.co.uk) has been hit by...
HackSpy Trojan Exploit this tool make undetectable trojan virus….which can help you to spy on other computers…….. this version consists of a trojan...
UK Police and FBI have arrested a teenager suspected to be Cracka, the hacker who hacked the CIA Director John Brennan. The...
After an investigation period, details were published about a unique cyberattack on a Russian bank where a malware placed trade orders for...
In this feature, we highlight some of the key tactics used by cybercriminals via online dating websites, helping you stay safe on...
The New York Police Department has admitted to using controversial cell phone spying systems known as Stingrays—which can be used to track...
Attackers steal users’ Netflix credentials and add them to black markets focused on providing access to the streaming service for cheaper prices....
This smart building was hacked by IBM researchers to show hacking risks associated with Internet of Things. IBM security researchers are warning...
Last year, IRS was hacked twice where personal information of thousands of taxpayers was stolen. Now, according to a statement issued Tuesday...
Once an almost unheard-of phenomenon, online dating is today a go-to resource for many busy, career-oriented individuals for finding their true love...
Attacks in the cyberspace have been a cause of concern for the entire world. The world, where everything is being carried over...
ESET has seen a rise in malware developed using scripting languages. We can understand the threats better by isolating them in a...
Attackers can take over Cisco firewalls and VPN servers. Cisco has released urgent security patches aimed at fixing a security vulnerability in some...
Messages coming to or from non-encrypted sources will be flagged by Google. Google has confirmed a number of changes to Gmail with...
Think of third-party app stores as independent shops in the city where people go to as an alternative to the city mall....
Anonymous hackers breached a South African job portal which hosts job fair for the locals — However, Anonymous decided to leak the...
Breach comes a year after a previous hack compromised 300,000 people. The US Internal Revenue Service was the target of a malware attack...
Short Bytes: Remember the white hat hackers — The White Team — responsible for creating the Linux.Wifatch malware last October? The same hackers...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams