Microsoft has released stats regarding Windows 10 usage worldwide which proves the point that user privacy is a very real concern Although,...
Short Bytes: In this article, I bring to you a new project called Javascript Tips that promises to deliver you one Javascript tip per...
It has been almost half a year since Microsoft released Windows 10, and the decision whether or not to migrate computers to...
A number of weeks back, security researcher Parvez Anwar posted a number of DLL hijacking vulnerabilities within Microsoft Office on Twitter [1]....
As ever, ESET is once again in attendance at CES in Las Vegas, offering you expert insight into all the security aspects...
IOActive’s Fernando Arnaboldi has sounded the alarm on three major flaws in Drupal’s update process that may allow attackers to poison Drupal...
Encrypting all HTTP traffic has long been considered a key security goal, but there have been two key obstacles to this. First,...
Short Bytes: From an IP address associated with 32nd Chaos Communication Congress (32c3) taking place in Germany, some unknown hackers sent a...
The security-focused smartphone contained vulnerabilities which allow hackers to control the device’s modem and call functions. Researchers have revealed a severe vulnerability in...
Malware was infecting machines, adding them to its botnet.Similar-looking malware targeting both Linux and Windows computers has been linked to a DDoSing...
Short Bytes: Being Anonymous online is the need of the hour, and TOR browser does that job quite efficiently and honestly. But...
Exploit Flash Heap Isolation for a chance to “win” $100,000 If you can exploit Adobe’s Heap Isolation mitigation in Flash player version...
Google had to intervene to fix a few vulnerabilities that risked exposing its Nexus devices and related Android operating system to remote...
Anonymous Responds to Thai Police’s Flawed Murder Investigation by Hacking 14 Thai Websites The hackers at Anonymous are yet again busy in...
Disabling ad-blocker at Forbes will unleash a malware Web publications usually ask readers to disable ad blockers if visiting their websites with...
Missing Bookseller Case Compels Anonymous’ Hong Kong division to attack Chinese police websites The infamous hacking group Anonymous’ Hong Kong division has...
Short Bytes: An Indian hacking collective named Indian Black Hats has defaced multiple Pakistani websites. This Kerala-based group has dedicated the attack to the...
The US Government issued a final rule implementing the Executive Order 13694. US can apply economic sanctions in response to cyber attacks....
IT’S BEEN MORE than 30 years since David Chaum launched the ideas that would serve as much of the groundwork for anonymity...
Look who’s back? The Dark Web Hacking Forum ‘Hell’ Just months after users speculated that the infamous dark web hacking forum, ‘Hell’ was...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment