SANRIO, THE TOKYO-BASED owner of the Hello Kitty brand, may be Japan’s global purveyor of kitschy cuteness. But the leak of 3.3...
Some lucky users are about to have a merry Christmas.Users that had the bad luck of getting infected with the Gomasom ransomware...
Short Bytes: This Sunday, Japan police revealed that the hacktivist collective Anonymous has attacked about 100 websites in Japan since September. The group...
The IT security researcher “Chris Vickery” who exposed MacKeeper and Hzone data breach has now discovered a hack of database belonging to...
Twitter account of the former CEO of Turing Pharmaceuticals Martin Shkreli aka pharma bro has been hacked by an unknown hacker who...
Microsoft SmartScreen, integrated with Microsoft Edge, Internet Explorer, and the Windows operating system, has helped protect users from socially engineered attacks such...
Imagine this. Your girlfriend needs to type a very important report for her Accounting class but she forgot the password to her...
Banking industry needs more time, has too much on its plate.The Payment Card Industry Security Standards Council (PCI SSC) has announced that...
Short Bytes: While playing Super Mario Bros in your desktop web browser was already possible, a coder has given us another reason to...
OS X: NetSpot is a free utility that makes it easy to map out your wireless network, do a site survey if...
After VTech, another kids service suffers a data breach.Personal details on 3.3 million accounts of Hello Kitty fans are available online, most...
The online hacktivist Anonymous has claimed the responsibility for a massive 40Gbps DDoS attack on Turkish DNS Servers under NIC.tr — The reason...
As hoverboards become the number one item on almost every child’s (and some adults) Christmas wish list, reports have emerged over the...
On 17th October 2015, a generous man uploaded an application on Google Play Store named “Cybrary”. The application was meant for people...
Short Bytes: OS X is considered comparatively safer than Windows, but it does not necessarily conclude that MAC OS X does not have any...
The cyber war between Armenians and Azerbaijani hackers seems never ending — Like this recent cyber attack in which the Armenian hackers...
Juniper network has had a major breach which has led to suspicions of a group of foreign hackers spying on the encrypted...
Short Bytes: Before driving to your nearest cinema to catch the latest Star Wars movie, here’s something Master Yoda wants you to do....
Security experts have warned US businesses which still haven’t invested in chip and PIN (EMV) readers to remain extra vigilant this holiday...
A few days before Thanksgiving, George Hotz, a 26-year-old hacker, invites me to his house in San Francisco to check out a...
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment
How Safe is Your TinyProxy? Step-by-Step Guide to Exploiting Tinyproxy’s Zero Day Vulnerability
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications