Russian ISP Eurobyte fails to answer Cisco’s emails, allows malvertising campaign to go on undisturbed. Cisco’s Talos research team has managed to identify...
When it comes to securing homes and businesses, a security camera is a privileged solution but it paradoxical is exposing users to...
The TV cable and Internet service provider Time Warner Cable is warning customers their emails and passwords may have been exposed. Nearly 320,000...
First major automaker (aside from Tesla) to issue guidelines promising not to sue researchers. On January 5, General Motors quietly flipped the...
Tech industry hits back at plans to create legal framework for hacking by spies, military and police. Tech companies including Apple, Microsoft,...
Short Bytes: DB-Engines is one of the most respected sources of database rankings. Over the past years, the website has listed the...
Pentagon has agreed that it will be extending official military honours to remote military personnel like military hackers or drone pilots after...
Car security is rising to the fore here at CES 2016, which is not altogether surprising as 2015 was the year when...
User data of over 320,000 accounts with Time Warner Cable were stolen when a hack led to details like email ids and...
THE SO-CALLED DARK web, for all its notoriety as a haven for criminals and drug dealers, is slowly starting to look more...
Romanian police have acted to end a series of malware ATM attacks carried out in Germany, France, Norway, Sweden, Poland, and Romania....
You have heard about phishing but now you will learn about Smishing. Hackers use phishing messages and compromised websites to steal credentials of...
Short Bytes: Last year, the FBI engaged in the largest ever law enforcement hacking campaign to shut down “the largest remaining known...
Here’s a trick that’s been around for a while but may have passed you by: secret category codes added by Netflix engineers...
Zscaler ThreatLabZ detected a new infostealer malware family dubbed Spymel that uses stolen certificates to evade detection. In late December, security experts...
Short Bytes: Ghost Squad Hackers group has taken down multiple .gov websites in Ethiopia. The collective has blamed the government for killing...
The terrorists first murdered the female journalist Ruqia Hassan and then hacked her Facebook account to spy on her contacts. The terrorist from...
A security flaw in Blackphone 1 smartphone allowed anyone to take control of the device Blackphone 1 smartphones, one of many privacy-focused...
Short Bytes: Technologies like IOT, 3D printing, VR camera and Tesla skimmed through entire 2015. But which technology in 2016 is going...
FBI has taken down a site involved in Child pornography through some hacking techniques that have never been used in the history...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment