A new analysis of the Sofacy APT gang, a Russian-speaking group carrying out targeted attacks against military and government offices for close...
JARVIS is Iron Man’s personal assistant. With the help of a few windows utilities we can create our own JARVIS system. ...
A lot of people think that TOR services are unhackable because they are on a “secure environment”, but the truth is that...
MORE THAN TWO years after Ross Ulbricht was arrested in a San Francisco and accused of creating and running the Dark Web...
FireEye Threat Intelligence analysts have discovered a new phishing attack carried by a Chinese group using legitimate service like dropbox. Analysts found...
Short Bytes: The Boston Consulting Group has released its 10th edition of the top 50 most innovative companies in the world. The list...
J D Wetherspoon, a famous pub chain in Ireland and the UK has announced that they’ve faced a massive data breach when...
The latest Facebook scam asks users to download a video player — The price for this player is your login credentials. Facebook...
Linux is considered as one of the most secure operating systems — However, there’s a trojan attacking specifically those on Linux. Linux...
Confused about being able to assess the suitability of apps for your children? This handy features highlights some of the key things...
Short Bytes: Just like every year, Google has just released its annual End Of The Year lists. This list contains 2015’s top...
A Sharjah-based Investbank has been asked for ransom by a hacker who breached into bank’s database and has threatened the bank if...
The poorly thought-out and crude surveillance technique could have a devastating effect on the country’s internet security. In less than a month,...
Short Bytes: In the past, time and again, people have called the scripting languages a root cause of software vulnerability and the latest...
Surreptitious attacks often prey on people visiting legitimate sites. A new wave of crypto ransomware is hitting Windows users courtesy of poorly...
Cyber criminals have turned their attention towards x-rated sites and are using their most favorite tool- malvertising. Malvertising is short-term used for...
Ponmocup is one of the oldest botnet that infected more than 15 million machines across the years, but many experts still ignore...
The goal of BDF is to patch executable binaries with user desired shellcode and continue normal execution of the prepatched state. First...
Pub chain JD Wetherspoon says card data of 100 customers has been stolen from a database after it was hacked. “Very limited”...
A HACKER WHO broke into a large bank in the United Arab Emirates made good on his threat to release customer data...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft