Pub chain JD Wetherspoon says card data of 100 customers has been stolen from a database after it was hacked. “Very limited”...
A HACKER WHO broke into a large bank in the United Arab Emirates made good on his threat to release customer data...
Short Bytes: Apple has made good on its promise to make Swift an open source programming language under the Apache License. The...
The largest Anonymous Twitter account was found trolling the ISIS symporters with memes and photoshopped images. Anonymous is known for exposing social...
In November 2015, the Open Whisper system launched protected voice calling and texting application for Android called “Signal” but soon after the...
Google accused by EFF for Collecting Students Data via Chromebook. The Electronic Frontier Foundation, a civil liberties group, has lodged a complaint...
After being an object of constant criticism universally by IT professionals for being volatile, unstable and unreliable, the time has come to...
With the rise of inexpensive Virtual Servers and popular services that install insecurely by default, coupled with some juicy vulnerabilities, like CVE-2015-5377...
Google got accidentally DDoSed by an unnamed European network carrier, sending its cloud service offline on the old continent for about an...
The Chinese Government says it has arrested the hackers responsible for breaching the Office of Personnel Management database (OPM). The Chinese government...
This report is the continuation of “#root via SMS”, a research made by the SCADA Strangelove team in 2014. It was devoted...
The UK’s digital spy agency, GCHQ, has admitted for the first time in court that it hacks computers, smartphones, and networks in the...
Twice in the past year, security researchers have found and reported critical vulnerabilities in Modbus gateways built by Advantech that are used...
It is easy to hack a domain and set up scams for visitors but using a government email address to run a...
New day, new phishing attack! This time, it’s the Apple id which has been used by the attackers to steal from the...
A hacking group (Armada Collective) which was previously held responsible for launching DDoS attacks on ProtonMail is back and this time targeting...
Thailand police servers are the latest in the online breaches — This breach is a part of the campaign (#OpSingleGateway) launched by...
Microsoft has started to offer potentially unwanted application (PUA) protection in its anti-malware products for enterprise firms. The news means that businesses...
Attackers can bypass authentication and access patient data. CERT/CC sounded the alarm on users of the Cardio Server ECG Management System, a broad-scope...
Short Bytes: Facing problems with your broadband connection is a common headache that most people struggle with. The UK telecom regulator Ofcom...
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
Compromising Cryptographic Key Security Through PuTTY: A Deep Dive into CVE-2024-31497
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files
Iranian MuddyWater Hackers Adopt New C2 Tool ‘DarkBeatC2’ in Latest Campaign
Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack
Sneaky Credit Card Skimmer Disguised as Harmless Facebook Tracker
U.S. Federal Agencies Ordered to Hunt for Signs of Microsoft Breach and Mitigate Risks
TA547 Phishing Attack Hits German Firms with Rhadamanthys Stealer