Anonsec group hacked NASA network and released a data dump of data online. The hackers also hijacked a Global Hawk drone. Hackers belonging...
JUST WHEN THE Silk Road’s saga of dirty money and double-dealing seemed to be winding down, one of the federal agents who...
A multi-billion U.S. Dollar firewall run by the Department of Homeland Security meant to detect and prevent nation-state hacks against the government...
Security researcher Chris Vickery has discovered that hackers can abuse HP LaserJet Printers and host malicious files on their hard drive. The famous...
An unmodified default setting in Apache Web Servers revealed crucial details related to TOR traffic that passed through that server. It is...
Short Bytes: It’s very easy to find out who has ignored your friend request on the largest social networking site Facebook. You can...
Security experts at FireEye are warning attackers can exploit the JSPatch hot patching technique to serve malicious code and put iOS users...
Image: Arch Linux Short Bytes: The mere thought of permanently damaging your laptop is daunting. But, what if you are trying to...
Short Bytes: Selecting the right VPN service to fulfill your needs is a monumental task. Keeping in mind the same, a Reddit...
Unprotected HP printer HDDs can be abused if not protected. Security researcher Chris Vickery has discovered that HP LaserJet printers may be abused...
Short Bytes: According to the latest documents provided by Edward Snowden to The Intercept, NSA and GCHQ were involved in surveillance activities...
Lately, I was doing research connected with different updating strategies, and I tested a few applications working under Mac OS X. This...
Default Settings In Apache Servers Can Leak Details about Tor traffic. This has happened the second time in this week. Leaving default setting...
To date, it has always been reported that drones can potentially be hacked and a few cases where they, in fact, had...
Short Bytes: By investing some time and money, now you can make a portable Raspberry Pi TOR proxy router. Using this device, you...
The cyber war between Armenians and Azerbaijani hackers seems never ending — Like this recent cyber attack in which the Armenian hackers...
Apple is working on wireless charging technology with aim to revolutionise the way of charging electronic devices Last year, Nikola Labs launched an...
Experts Discover the Dangers of Using apps like ‘Be Like Bill’ Facebook Meme Generator The immensely popular Be Like Facebook Meme generator...
The HSBC UK’s banking servers were under powerful DDoS attack — Bank claims it defended its system against the attacks The online...
WhatsApp is working on making your chats more secure by introducing end-to-end encryption along with a much deeper Facebook integration. A developer...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment