Newly disclosed documents show that the NSA had found a way to continue spying on American citizens’ email traffic from overseas. The...
Hidden analytics code tracks everything users do, EVERYTHING Analytics code deeply hidden in popular Google Chrome extensions is being used to track...
Root certificate debacle that hit Lenovo now visits the House of Dell. In a move eerily similar to the Superfish debacle that...
The readers know about Anonymous waging war against ISIS, but hardly anyone knows about a group which has been working quietly (well,...
Silent Circle, the developer of the self-proclaimed NSA-proof smartphone has announced that it is making sure to distances itself from criminals and terrorists...
Is the idea of biometrics as a secure payment system a fad, fiction or fact? This feature looks at whether DNA is...
Short Bytes: In order to protect its online operations from security agencies and hackers, and to propel its propaganda, ISIS is looking...
ISIS has unveiled list of U.S. officials who are on their target — The list includes names of both current and former...
Short Bytes: Belgian people have found a new weapon to deal with the terror threats in the form of cat pics. As...
In the wake of the Paris attacks, the vigilante hacker group Anonymous has declared war on so-called Islamic State using the internet...
ISIS hijacks Kuwait security firm’s OPSEC manual.Yesterday, various Twitter accounts were tweeting about an ISIS OPSEC manual describing the terrorist group’s cyber-security...
PowerView is a PowerShell tool to achieve network information on Windows domains for cyber security services and ethical hacking training professionals. It...
Log wipers, timestompers may have helped hackers stay quiet in terabyte raids. Damballa researchers Willis McDonald and Loucif Kharouni say the attackers...
We have received a lot of reports about a new ransomware that we are calling CryptInfinite based on the Windows Registry key created by this ransomware....
Chain of hotels owned by Starwood Hotels & Resorts Worldwide properties faced a data breach earlier this year and hackers got access...
Short Bytes: The ISIS hackers, calling themselves the “Islamic State Cyber Army,” have used Twitter to post the names and addresses of...
Rohit Jawa, a 25-year-old man, was arrested in Cincinnati, Ohio on 15th June 2015 for scamming on eBay — He was accused...
Short Bytes: The Anonymous hacktivists have claimed that they have uncovered a secret Islamic State plan for a worldwide terror attack this Sunday....
The online hacktivist Anonymous shut down 8824 Twitter accounts of ISIS members + followers in the first phase of OpParis — In...
Someone is using Anonymous’s name to spread rumors about ISIS planning to target different events worldwide. A Pastebin post posted by someone claiming to have a...
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack
U.S. Federal Agencies Ordered to Hunt for Signs of Microsoft Breach and Mitigate Risks
TA547 Phishing Attack Hits German Firms with Rhadamanthys Stealer
Python’s PyPI Reveals Its Secrets
Fortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability
‘eXotic Visit’ Spyware Campaign Targets Android Users in India and Pakistan
Raspberry Robin Returns: New Malware Campaign Spreading Through WSF Files
Beware: GitHub’s Fake Popularity Scam Tricking Developers into Downloading Malware
Webinar: Learn How to Stop Hackers from Exploiting Hidden Identity Weaknesses
Microsoft Fixes 149 Flaws in Huge April Patch Release, Zero-Days Included
Critical ‘BatBadBut’ Rust Vulnerability Exposes Windows Systems to Attacks
10-Year-Old ‘RUBYCARP’ Romanian Hacker Group Surfaces with Botnet
Hackers Targeting Human Rights Activists in Morocco and Western Sahara
Researchers Discover LG Smart TV Vulnerabilities Allowing Root Access
CL0P’s Ransomware Rampage – Security Measures for 2024
Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing
Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks
Watch Out for ‘Latrodectus’ – This Malware Could Be In Your Inbox