ShortRead: Anonymous trolled the ISIS terrorists a couple of days ago but rather than replying to the hacktivists, the group leaked personal...
Short Bytes: IBM is taking the parts from its JVM project by separating it from Java and making them usable for any...
Tor has hired a former Electronic Frontier Foundation (EFF) executive director to lead its project that is aimed for making the cyber...
A UK company which helps consumers and small businesses create websites and online stores has taken itself and its customers' sites offline,...
After Facebook and Google, Twitter also has started warning message regarding state sponsored attack to some of its users — Alert urges...
Linus Torvalds says almost no-one ‘actually ever hit the problem’, or will code at Xmas. Linux Lord Linus Torvalds says the fourth...
Increasingly, on special occasions like birthdays and Christmas, parents are buying mobile and internet connected devices for their children. Our guide looks...
Short Bytes: Sony’s PlayStation 4 is now successfully jailbroken. A hacker has claimed to have developed a completely jailbroken version of the...
Researchers are still looking for a Tor alternative.Scientists at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) have created an anonymous...
Image: fossBytes Short Bytes: Anonymous is known for taking up different causes and defacing the offensive websites. However, this time, the hacktivist group...
Short Bytes: WebTorrent is a BitTorrent client written for the web in JavaScript. It uses WebRTC for P2P transport and you don’t need...
Experts at FireEye have discovered a stealthy botnet relying on a backdoor called LATENTBOT has compromised companies around. Experts at FireEye have discovered...
he hacker did it “for the lulz,” no other reason.Anonymous have just released data online belonging to the European Space Agency (ESA)....
British government’s new investigatory bill (pdf) has a proposal on making it legal to hack smart toys in order to allow investigators to...
ShortRead: The online hacktivist Anonymous has breached the subdomains of the European Space Agency website and leaked personal and login credentials of thousands of...
Short Bytes: Anonymous is a decentralized hacktivist group that has been into existence since 2003. It is hard to predict the actual size...
It’s not surprising to know that Microsoft is desperate to have Windows 10 on user’s PCs. As for users still running Windows...
In a world where government surveillance is a big thing there is a need for tools countering the whole idea of keeping...
MIT researchers claim they have developed “Vuvuzela” SMS Text Messaging System which is way more secure than Tor and provides guaranteed untraceable communication....
An article published by The Guardian in 2011 on the topic Cybercrime: is it out of control? received a nasty response from a...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft