Microsoft has started to offer potentially unwanted application (PUA) protection in its anti-malware products for enterprise firms. The news means that businesses...
Attackers can bypass authentication and access patient data. CERT/CC sounded the alarm on users of the Cardio Server ECG Management System, a broad-scope...
Short Bytes: Facing problems with your broadband connection is a common headache that most people struggle with. The UK telecom regulator Ofcom...
Short Bytes: Anonymous is planning to ‘celebrate’ December 11 as an ‘anti-ISIS day of rage’. The hacktivist collective is planning to fill...
China is being blamed for a major cyber attack on the computers at the Bureau of Meteorology, which has compromised sensitive systems...
Apparently tech support scams never get old. But they have gotten more aggressive, according to a Symantec blog post penned by researcher Deepak...
Hackers have targeted three Greek banks for a third time in five days, demanding a ransom from each lender of 20,000 bitcoin...
ig brands are asked to pay royalties for usage of HTTPS A Texas company filed over 60 lawsuits against big brands that...
Yesterday HackRead reported how Anonymous breached into the official website of the United Nations Framework Convention on Climate Change (UNFCCC) and leaked...
A group from Brazil has started an unusual campaign against the people who make racist comments on the Internet. What they do...
Blackberry is all set to shut down its operations in Pakistan. The statement came from the company after continuing request from the...
Google has denied all the accusations that were put forward regarding monitoring or censoring of those YouTube videos that are made for...
If many endpoints’ traffic pass through the VM host, why not move security there, sort of catch “bad things” before they even...
Dropbox abused by Chinese state-sponsored actors.A malware targeting mass media agencies in Hong Kong was discovered by FireEye’s security researchers. This malware,...
Short Bytes: In the developing markets, making web browsing on mobile a great experience, is a challenging job for smartphone makers and...
WE’VE BECOME ACCUSTOMED to massive hacks targeting financial and retail institutions, but a recent digital ransacking of a popular kids’ electronics manufacturer...
Versions one, two, decrypted days after launch. Pwned ransomware Linux Encoder has infected 3000 machines in a month, Russian security firm Dr...
I intended originally for this series to contain only three posts, and in order to achieve that, this post is longer than...
Researchers have found that thousands of Internet gateways, routers, modems and other embedded devices share cryptographic keys and certificates, exposing millions of...
The hacktivist group Anonymous breached into the website of United Nations Framework Convention on Climate Change (UNFCCC) and leaked a trove of...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams