Nowadays, every individual who uses the internet is well aware of IP and MAC addresses but for those who don’t, MAC address...
Anonymous is known for conducting cyber attacks against injustice but not every operation makes it to the news — There are several...
Europol have been working alongside a number of European law enforcement authorities in an attempt to crackdown against the use of Remote...
ShortRead: MacKeeper, a utility software suite for Mac OS X faced a data breach which has exposed details in relation to its...
Image | GCHQ Short Bytes: NSA’s British counterpart GCHQ has just open sourced its spying tool named Gaffer. The software is written...
Japanese company “Secom” has developed a drone that could be tough to handle for intruders trying to escape after committing any crime....
Image | fossBytes Short Bytes: A hacker from Anonymous collective has come forward to explain how Anonymous locates ISIS-affiliated Twitter handles and...
Attackers carry out SMS fraud via the infected phones. The Android/OpFake and the Android/Marry malware families, two banking trojans targeting mobile devices, have...
Leaky database server left exposed online is at fault.For the past few weeks, security researcher Chris Vickery has been working on discovering...
Short Bytes: The notorious macro malware from the 1990s is making a comeback in a big manner. The latest security reports suggest...
The Obama administration’s calls for backdoors echo the Clinton-era key escrow fiasco. In the face of a Federal Bureau of Investigation proposal...
Today’s arrests are part of a co-ordinated Europol initiative to crack down on all levels of computer crime. Norway’s Kripos national criminal...
Wave of attacks grows. Researchers advise sites to install just-released patch. Attackers are actively exploiting a critical remote command-execution vulnerability that has...
A new research has found out that numerous parking applications available in the smartphone market contain strong vulnerabilities that can allow hackers...
Sony’s Play Station 4 is one of the world’s most popular and most selling gaming consoles with more than 10 million users. In...
ShortRead: Anonymous trolled the ISIS terrorists a couple of days ago but rather than replying to the hacktivists, the group leaked personal...
Short Bytes: IBM is taking the parts from its JVM project by separating it from Java and making them usable for any...
Tor has hired a former Electronic Frontier Foundation (EFF) executive director to lead its project that is aimed for making the cyber...
A UK company which helps consumers and small businesses create websites and online stores has taken itself and its customers' sites offline,...
After Facebook and Google, Twitter also has started warning message regarding state sponsored attack to some of its users — Alert urges...
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment
How Safe is Your TinyProxy? Step-by-Step Guide to Exploiting Tinyproxy’s Zero Day Vulnerability
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications