The official website of the Russian embassy in Israel was hacked and defaced by Azerbaijani hackers — Thanks to the words for...
The Internet’s largest torrents platform Kickass faced major outage due to a series of powerful DDoS attacks by unknown hackers Kickass Torrents...
LastPass Password Manager – renowned for being a secure vault for user’s passwords, has recently demonstrated vulnerabilities that could expose many users’...
The hacker inserted a Trojan malware into Cryptsy’s code so that he could access precious information and transfer cyber currencies. Paul Vernon, also...
Angler Exploit Kit is not going anywhere, it’s here to stay and already compromised 90,000 websites. The Angler Exploit Kit (AEK) is increasing its...
In the summer of 2014, anonymous hackers flooded the internet with private nude photos of major (and minor) celebrities. Two years later,...
New interesting revelation about the Stuxnet attack published by The New York Times, a must read for experts. The popular cyber security...
Here are 5 of the most dangerous cyber security vulnerabilities that are exploited by hackers All the major government organizations and financial firms...
Ukrainian Government is accusing Russia of organizing hacker attacks against the Boryspil airport’s networks. Cyber security experts of the State Service of...
Short Bytes: Your inspiration behind learning how to code could be anything. It could be a desire to become a professional developer...
This article looks at how an attacker can intercept and read emails sent from one email provider to another by performing a...
Short Bytes: In Enigma Software’s yearly top 20 cities list, Tampa maintains its top spot with 506% higher infections than the national average....
Short Bytes: A Web App Attack is one of the biggest threats faced by websites and online businesses. In this article, we...
Over the years, I have written many articles here on Null Byte chronicling the many the hacks of the NSA, including the...
At the recent ShmooCon conference a researcher presented a LastPass phishing attack that could allow hackers to steal your password. We discussed...
You maybe a top notch developer or programmer but do you know which program languages generate most software security bugs? Recently, a lot...
Short Bytes: Wikipedia is the world’s seventh most popular website. This free online encyclopedia has been providing us information from the past...
Using a few windows tools we are able to kick players offline and automatically win by default. Whether you are a...
Image: Wtamu.edu Short Bytes: A report published by Mathew Sag claims that the number of people sued for illegal file sharing in...
Facebook notices when a security feature has been abused by placing a photo tag verification to reduce the amount of fake accounts....
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files
Iranian MuddyWater Hackers Adopt New C2 Tool ‘DarkBeatC2’ in Latest Campaign
Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack
Sneaky Credit Card Skimmer Disguised as Harmless Facebook Tracker
U.S. Federal Agencies Ordered to Hunt for Signs of Microsoft Breach and Mitigate Risks
TA547 Phishing Attack Hits German Firms with Rhadamanthys Stealer
Python’s PyPI Reveals Its Secrets