Watch out for latest WhatsApp scam tricking users into opening malware link sent by ”friends” The favorite app of all youngsters and...
Short Bytes: Windows 10 has an inbuilt feature which lets a user record the Windows screen up to 2 hours. This screen...
Almost a year ago we warned about the spreading of Remtasu, and far from lessening, we have been able to identify numerous...
A hacker accessed an employee’s email account at the Department of Justice and stole 200GB of files including records of 9,000 DHS...
Oracle patches Java installer against DLL hijacking issue. Oracle has released new Java installers to fix a well-known security issue (CVE-2016-0603) that also...
Short Bytes: Irritated by the telemetry and spying features in Windows 10, a Voat user decided to make the switch. After installing...
During a recent penetration test, I was performing some packet captures and noticed some unencrypted Microsoft SQL Server (MSSQL) traffic. The syntax was...
T9000 can also steal files from your hard drives. A new backdoor trojan is making the rounds, coming equipped with features that allow...
Russian authorities raided offices of a Russian film distribution and production company as part of an operation against the Dyre gang. Russian...
Short Bytes: Today I’m sharing a clever implementation of Hangman in python by programmer Danver Braganza. Take a look at this 3-lines-long program and...
The internet is abuzz with news about a new backdoor Trojan that is equipped with such advanced features that it can steal...
Anonymous and supporters of LulzSec hackers target African governments against massive corruption. The online hacktivist Anonymous is targeting African countries to protest...
The brand new Torrents-Time browser plugin has helped The Pirate Bay take the industry of online video portal by storm as it...
Pro-rape and controversy child Roosh blames Hacktivists for hacking his family’s address and spreading hoax news The controversial ‘neo-masculinist” Roosh has claimed...
Short Bytes: Do you remember computer viruses from 1990’s that left you with no option but to reinstall your operating system? Well,...
Spam campaign targets Portuguese-speaking firms in Brazil and other regions to deliver malware and steal sensitive data. Symantec has observed an ongoing...
THREE AND A half years after he sought temporary asylum in the Ecuadorean embassy in London only to find himself a captive...
Here are 7 activities that users should avoid doing on the Internet The Internet is a wonderland. It is a place where...
Experts at the SANS Technology Institute spotted an OS X scareware campaign that leverages fake Adobe Flash Player installers. Johannes Ullrich, security...
Relive simpler times for some Friday fun. The Internet Archive has opened a new collection dubbed the Malware Museum that lets you run...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment