A new zero-day vulnerability allows Android or Linux applications to escalate privileges. Security researchers have discovered a new zero-day vulnerability in Linux kernel that...
A new archive containing alleged voting records of millions of US citizens is available on a hidden service on the dark web....
A hacker who claims to be the ally of the ISIS terrorist group managed to hack the official website of Tsinghua University, China’s...
A new Linux malware has been discovered which aims to help criminals steal data and spy on the PCs of infected users....
Government Officials under Attack: Hackers Who targeted CIA Director now reach the White House The hacking group Crackas With Attitude have been...
The computer networks installed at the main airport in Kiev, Ukraine, have been identified as containing malware. The discovery was made public...
Short Bytes: Annoyed by GitHub’s outdated Issues Tracker feature, a CloudFlare developer has written an open letter to GitHub, suggesting the website to...
Only Latest Technology PCs will run Windows 10 – Confirms Microsoft Now this can be termed as nothing else but a bombshell...
Short Bytes: As new mobile threats continue to emerge, the white hat hackers are busy busting the ways your phone can be...
Dendroid is a HTTP RAT that is marketed as being transparent to the user and firmware interface, having a sophisticated PHP panel,...
A hacking tool discovered by analysts at F-Secure, which is capable of stealing information from a connected Windows machine. USB Cleaver seems...
Turkish hackers target Russian banking website, mock the Russian SU-24 jet incident. A group of Turkish hackers going by the online handle WKPF...
Dr.Web, a Russian antivirus maker, has detected a new threat against Linux users, the Linux.Ekocms.1 trojan, which includes special features that allow...
Short Bytes: When we talk about the best Windows 10 web browsers, our list narrows down to Chrome, Firefox, Edge etc. Microsoft...
Walmart-owned store patches hole, but it was open for nearly 2 years. Retailer Asda dragged its heels for nearly two years before...
A new variant of the infamous Tinba banking trojan has emerged in the wild and is targeting financial institutions in the Asia...
Twitter is down. Yes, the social media giant’s website and mobile apps are inaccessible at the moment. Visitors to the website were greeted...
Finnish fellow scores $10k bug bounty for reporting malformed HTML mess. Video A stored XSS vuln in Yahoo! Mail has netted Finnish...
At some point over the weekend, the official website of Belinda Carlisle was compromised, displaying banner ads for a Canadian Pharmacy page....
This is how a $30 D-Link webcam can be converted into a backdoor. Researchers at US security firm Vectra Networks have hacked a ‘tiny’...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft