A new zero-day vulnerability allows Android or Linux applications to escalate privileges. Security researchers have discovered a new zero-day vulnerability in Linux kernel that...
A new archive containing alleged voting records of millions of US citizens is available on a hidden service on the dark web....
A hacker who claims to be the ally of the ISIS terrorist group managed to hack the official website of Tsinghua University, China’s...
A new Linux malware has been discovered which aims to help criminals steal data and spy on the PCs of infected users....
Government Officials under Attack: Hackers Who targeted CIA Director now reach the White House The hacking group Crackas With Attitude have been...
The computer networks installed at the main airport in Kiev, Ukraine, have been identified as containing malware. The discovery was made public...
Short Bytes: Annoyed by GitHub’s outdated Issues Tracker feature, a CloudFlare developer has written an open letter to GitHub, suggesting the website to...
Only Latest Technology PCs will run Windows 10 – Confirms Microsoft Now this can be termed as nothing else but a bombshell...
Short Bytes: As new mobile threats continue to emerge, the white hat hackers are busy busting the ways your phone can be...
Dendroid is a HTTP RAT that is marketed as being transparent to the user and firmware interface, having a sophisticated PHP panel,...
A hacking tool discovered by analysts at F-Secure, which is capable of stealing information from a connected Windows machine. USB Cleaver seems...
Turkish hackers target Russian banking website, mock the Russian SU-24 jet incident. A group of Turkish hackers going by the online handle WKPF...
Dr.Web, a Russian antivirus maker, has detected a new threat against Linux users, the Linux.Ekocms.1 trojan, which includes special features that allow...
Short Bytes: When we talk about the best Windows 10 web browsers, our list narrows down to Chrome, Firefox, Edge etc. Microsoft...
Walmart-owned store patches hole, but it was open for nearly 2 years. Retailer Asda dragged its heels for nearly two years before...
A new variant of the infamous Tinba banking trojan has emerged in the wild and is targeting financial institutions in the Asia...
Twitter is down. Yes, the social media giant’s website and mobile apps are inaccessible at the moment. Visitors to the website were greeted...
Finnish fellow scores $10k bug bounty for reporting malformed HTML mess. Video A stored XSS vuln in Yahoo! Mail has netted Finnish...
At some point over the weekend, the official website of Belinda Carlisle was compromised, displaying banner ads for a Canadian Pharmacy page....
This is how a $30 D-Link webcam can be converted into a backdoor. Researchers at US security firm Vectra Networks have hacked a ‘tiny’...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment