Cricket South Africa page got hacked earlier today where hackers posted racist and sexual content on the page which surprised many of...
EVEN AS HIS face towered 10 feet above the crowd at the Bitcoin Investor’s Conference in Las Vegas, Craig Steven Wright was,...
Short Bytes: Microsoft, long known for harbouring different kinds of malware, this time, “unveils” bootkit, a malware which loads even before the Windows...
Lately the threat actors behind Dridex malware have been very active. Across all the recent Dridex phishing campaigns the technique is the same....
Apple has piled on the patches already released by Adobe and Microsoft today, and pushed out updates for iOS, OS X, Apple...
The internet’s root servers came under a concerted distributed denial of service (DDoS) attack last week that effectively knocked three of the...
A recent Facebook phishing scam asks users on the social media giant to verify their page because a suspected page forgery was detected...
After hacking nuclear plants, Refrigerator, House Arrest Ankle Bracelet, Smartphones GPS Signals, Electronic Skateboards, Driverless Cars, Jeep, Computer Controlled Sniper Rifle and Jeep Cherokee etc, it is now time...
Short Bytes: With gitnonymous project, now you can obfuscate your true identity while making Git commits and pushing to public repositories. Using the...
The official Twitter account of renowned Pakistani journalist Hamid Mir has been hacked by an unknown hacker who is now leaking screenshots...
Windows 10 spying on users is not a new thing nor its force downloading tactics but Windows 10’s November update saw marked improvement...
ESET's senior research fellow David Harley explores and discusses the main issues surrounding copyright and social media.
TuneCore, an online music distribution/record label service on Friday, revealed that its database was breached by the hackers and they have been...
Social engineering is a pretty important item in a hacker’s toolkit.in Mr robot there was a time, we see Elliot, using social...
On September 11, 2015 I visited Media Markt in Utrecht Hoog Catherijne, a well-known electronics shop in The Netherlands. Since summer 2014, the biggest independent Dutch...
At a recent conference on “the future of wearables” I was asked to speak about security. I think my presentation surprised some...
The flaws can be exploited remotely through emails, Web pages, MMS and rogue apps. Google has released a new batch of security fixes...
Today at JSConf US Last Call in Florida, we announced that we will open-source the core components of Chakra as ChakraCore, which...
BackStab technique helps criminals get their hands on your private data, via unprotected phone backups A recent report from Palo Alto Networks...
Bootkit targeting banks and payment card processors hard to detect and remove. Malware targeting banks, payment card processors, and other financial services...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft