The Internet’s largest torrents platform Kickass faced major outage due to a series of powerful DDoS attacks by unknown hackers Kickass Torrents...
LastPass Password Manager – renowned for being a secure vault for user’s passwords, has recently demonstrated vulnerabilities that could expose many users’...
The hacker inserted a Trojan malware into Cryptsy’s code so that he could access precious information and transfer cyber currencies. Paul Vernon, also...
Angler Exploit Kit is not going anywhere, it’s here to stay and already compromised 90,000 websites. The Angler Exploit Kit (AEK) is increasing its...
In the summer of 2014, anonymous hackers flooded the internet with private nude photos of major (and minor) celebrities. Two years later,...
New interesting revelation about the Stuxnet attack published by The New York Times, a must read for experts. The popular cyber security...
Here are 5 of the most dangerous cyber security vulnerabilities that are exploited by hackers All the major government organizations and financial firms...
Ukrainian Government is accusing Russia of organizing hacker attacks against the Boryspil airport’s networks. Cyber security experts of the State Service of...
Short Bytes: Your inspiration behind learning how to code could be anything. It could be a desire to become a professional developer...
This article looks at how an attacker can intercept and read emails sent from one email provider to another by performing a...
Short Bytes: In Enigma Software’s yearly top 20 cities list, Tampa maintains its top spot with 506% higher infections than the national average....
Short Bytes: A Web App Attack is one of the biggest threats faced by websites and online businesses. In this article, we...
Over the years, I have written many articles here on Null Byte chronicling the many the hacks of the NSA, including the...
At the recent ShmooCon conference a researcher presented a LastPass phishing attack that could allow hackers to steal your password. We discussed...
You maybe a top notch developer or programmer but do you know which program languages generate most software security bugs? Recently, a lot...
Short Bytes: Wikipedia is the world’s seventh most popular website. This free online encyclopedia has been providing us information from the past...
Using a few windows tools we are able to kick players offline and automatically win by default. Whether you are a...
Image: Wtamu.edu Short Bytes: A report published by Mathew Sag claims that the number of people sued for illegal file sharing in...
Facebook notices when a security feature has been abused by placing a photo tag verification to reduce the amount of fake accounts....
It is being reported that the oil and gas sectors have suddenly become more vulnerable to cyber threats. In 2013, we at...
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
When is One Vulnerability Scanner Not Enough?
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024