Short Bytes: In a video found on the YouTube channel of Samy Kamkar, a USB drive beaded in a necklace has been shown...
Loser.com domain owner is not a fan of Donald Trump ? Just like itanimulli.com (reverse of illuminti.com) redirects users to the official website of the...
Good news for security researchers you can now earn some good money by reporting security bugs to Malwarebytes — Thanks to its...
The European Commission (EC) has decided to end anonymous virtual currency Bitcoin trading to track money-laundering that “helps terrorist group funding”. The...
In a world where everything which your computer can do, can be done on your smartphone, hacking cannot be left behind. The...
DMA Locker is another ransomware that appeared at the beginning of this year. For now it has been observed to be active...
Two major cyberattacks have siphoned over $50 million and nearly $80 million from a Belgian bank and an Austrian aircraft parts manufacturer,...
The Comodo app also replaces links and hijacks DNS. Developers have exposed the fact that Comodo Internet Security is actually a security threat...
Short Bytes: The UN is expected to announce its decision on WikiLeaks founder Julian Assange’s release on Friday. The whistleblower website has...
Short Bytes: Windows 10 comes with an inbuilt tool called “Reliability Monitor” using which a user can troubleshoot a personal computer for...
Wikileaks founder Julain Assange can be a free man this Friday — His fate depends on the decision from United Nation’s Working Group...
JSF**k JavaScript library abused to deliver malware. Security researchers have alerted eBay’s staff about a vulnerability in its online platform that lets...
Pastebin.com faced heavy DDoS attacks which forced the platform to go offline. Pastebin.com is a world renowned online platform where users can...
Millions of LG G3 smartphone users are at risk of losing critical personal data due to a severe security weakness dubbed as...
Short Bytes: The U.S. government is working on a firewall named EINSTEIN intrusion detection system that is expected to keep the federal agencies safe...
Text Messages are a Hacker’s Latest Weapon to Dole out PayPal Phishing Scams. The easiest way cybercriminals can try to hack your...
Short Bytes: Apart from learning the basic skills like HTML and CSS, the road to becoming a successful web developer needs some...
Remote code execution vulnerabilities have been found in the Android operating system, and patches released for Nexus devices. But what about your...
Twenty years ago, the first Word macro malware spread across the planet. Embedded inside a Word document, and rather unhelpfully given a...
Microsoft has been accused of pushing Windows 10 rather aggressively, and the company’s latest move is going to do nothing to silence...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment