A new analysis of the Sofacy APT gang, a Russian-speaking group carrying out targeted attacks against military and government offices for close...
JARVIS is Iron Man’s personal assistant. With the help of a few windows utilities we can create our own JARVIS system. ...
A lot of people think that TOR services are unhackable because they are on a “secure environment”, but the truth is that...
MORE THAN TWO years after Ross Ulbricht was arrested in a San Francisco and accused of creating and running the Dark Web...
FireEye Threat Intelligence analysts have discovered a new phishing attack carried by a Chinese group using legitimate service like dropbox. Analysts found...
Short Bytes: The Boston Consulting Group has released its 10th edition of the top 50 most innovative companies in the world. The list...
J D Wetherspoon, a famous pub chain in Ireland and the UK has announced that they’ve faced a massive data breach when...
The latest Facebook scam asks users to download a video player — The price for this player is your login credentials. Facebook...
Linux is considered as one of the most secure operating systems — However, there’s a trojan attacking specifically those on Linux. Linux...
Confused about being able to assess the suitability of apps for your children? This handy features highlights some of the key things...
Short Bytes: Just like every year, Google has just released its annual End Of The Year lists. This list contains 2015’s top...
A Sharjah-based Investbank has been asked for ransom by a hacker who breached into bank’s database and has threatened the bank if...
The poorly thought-out and crude surveillance technique could have a devastating effect on the country’s internet security. In less than a month,...
Short Bytes: In the past, time and again, people have called the scripting languages a root cause of software vulnerability and the latest...
Surreptitious attacks often prey on people visiting legitimate sites. A new wave of crypto ransomware is hitting Windows users courtesy of poorly...
Cyber criminals have turned their attention towards x-rated sites and are using their most favorite tool- malvertising. Malvertising is short-term used for...
Ponmocup is one of the oldest botnet that infected more than 15 million machines across the years, but many experts still ignore...
The goal of BDF is to patch executable binaries with user desired shellcode and continue normal execution of the prepatched state. First...
Pub chain JD Wetherspoon says card data of 100 customers has been stolen from a database after it was hacked. “Very limited”...
A HACKER WHO broke into a large bank in the United Arab Emirates made good on his threat to release customer data...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment