The official website of the Russian embassy in Israel was hacked and defaced by Azerbaijani hackers — Thanks to the words for...
The Internet’s largest torrents platform Kickass faced major outage due to a series of powerful DDoS attacks by unknown hackers Kickass Torrents...
LastPass Password Manager – renowned for being a secure vault for user’s passwords, has recently demonstrated vulnerabilities that could expose many users’...
The hacker inserted a Trojan malware into Cryptsy’s code so that he could access precious information and transfer cyber currencies. Paul Vernon, also...
Angler Exploit Kit is not going anywhere, it’s here to stay and already compromised 90,000 websites. The Angler Exploit Kit (AEK) is increasing its...
In the summer of 2014, anonymous hackers flooded the internet with private nude photos of major (and minor) celebrities. Two years later,...
New interesting revelation about the Stuxnet attack published by The New York Times, a must read for experts. The popular cyber security...
Here are 5 of the most dangerous cyber security vulnerabilities that are exploited by hackers All the major government organizations and financial firms...
Ukrainian Government is accusing Russia of organizing hacker attacks against the Boryspil airport’s networks. Cyber security experts of the State Service of...
Short Bytes: Your inspiration behind learning how to code could be anything. It could be a desire to become a professional developer...
This article looks at how an attacker can intercept and read emails sent from one email provider to another by performing a...
Short Bytes: In Enigma Software’s yearly top 20 cities list, Tampa maintains its top spot with 506% higher infections than the national average....
Short Bytes: A Web App Attack is one of the biggest threats faced by websites and online businesses. In this article, we...
Over the years, I have written many articles here on Null Byte chronicling the many the hacks of the NSA, including the...
At the recent ShmooCon conference a researcher presented a LastPass phishing attack that could allow hackers to steal your password. We discussed...
You maybe a top notch developer or programmer but do you know which program languages generate most software security bugs? Recently, a lot...
Short Bytes: Wikipedia is the world’s seventh most popular website. This free online encyclopedia has been providing us information from the past...
Using a few windows tools we are able to kick players offline and automatically win by default. Whether you are a...
Image: Wtamu.edu Short Bytes: A report published by Mathew Sag claims that the number of people sued for illegal file sharing in...
Facebook notices when a security feature has been abused by placing a photo tag verification to reduce the amount of fake accounts....
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment