British police arrested a man and a woman earlier this week, suspected of operating a website which offered services to online criminals...
Attackers can unmask users hidden under a VPN connection. A vulnerability into how VPN providers deal with port forwarding exposes the real IP...
Short bytes: General availability of Java 9 is announced by Oracle and it is coming on Sep 22nd, 2016. The major feature in...
IT’S enough to make Islamic State sit up and take notice, or at the very least get a little hot under the...
Embedded device mayhem as rivals share keys. More than 26,000 Cisco devices sold by Australia’s dominant telco Telstra are open to hijacking...
Vulnerability Test Suite (VTS) is a free application for Android that scans devices running the operating system for publicly-disclosed vulnerabilities. Publicly-disclosed vulnerabilities...
Security researcher warns hackers could steal personal information and turn the microphone of the doll into a surveillance device. Mattel’s latest Wi-Fi...
Short bytes: There are different ways to retrieve the WiFi password of the network that you are connected to. Out of these,...
Just a week after the news of ISIS moving their online operations to the dark web, one of their main websites has...
On Tuesday, Amazon started sending out emails to its users asking for a quick password reset, the reason is a possible breach...
According to an official document from the FBI, a Russian gang has been involved in a breach of 1.2 billion login credentials....
Short Bytes: Anonymous hacktivist group has just hacked an ISIS propaganda website on the dark web. Trolling ISIS and its supporters, the...
DRIDEX is steadily regaining its footing in the US just over a month after its takedown orchestrated by US and UK law enforcement...
SSH logins, server-side HTTPS certs baked in firmware. It’s what we all assumed, but quietly hoped wasn’t quite this bad. Lazy makers...
Over the last year, criminals in Russia found a way to steal 252 million Rubles ($3.8 million) from five unnamed banks, using a...
In short order, the newest version of Cryptowall has begun showing up in exploit kits. The SANS Internet Storm Center said on...
A certification tracking system (Credential Manager System) used by companies like Cisco, F5, IBM and Oracle has faced a data breach and...
Short Bytes: Budget smartphones are a very interesting smartphone segment where a customer looks for tons of features for a not-so-high price. As...
This introductory guide to online safety offers parents some useful security tips on how to protect their children.
A PoC shows the future dangers for smart TV sets.Many cyber-security vendors view ransomware as 2016’s biggest threat, and to help drive...
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
Compromising Cryptographic Key Security Through PuTTY: A Deep Dive into CVE-2024-31497
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files
Iranian MuddyWater Hackers Adopt New C2 Tool ‘DarkBeatC2’ in Latest Campaign
Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack
Sneaky Credit Card Skimmer Disguised as Harmless Facebook Tracker
U.S. Federal Agencies Ordered to Hunt for Signs of Microsoft Breach and Mitigate Risks
TA547 Phishing Attack Hits German Firms with Rhadamanthys Stealer