I intended originally for this series to contain only three posts, and in order to achieve that, this post is longer than...
Researchers have found that thousands of Internet gateways, routers, modems and other embedded devices share cryptographic keys and certificates, exposing millions of...
The hacktivist group Anonymous breached into the website of United Nations Framework Convention on Climate Change (UNFCCC) and leaked a trove of...
Short Bytes: The IMEI, or International Mobile Station Equipment Identity, is a unique number which is associated with your phone. The IMEI...
A Chinese company VTech, dealing in electronic toys has faced a massive data breach in which 4.8 million parents and children details...
RSI Videofied are a French company that produce a series of alarm panels that are fairly unique in the market. They are...
When it comes to online banking, the UK and the US leads the way with security – over 70% of Brits and...
Short Bytes: As we are making progress on the front of online security, the cybercriminals are competing head-to-head to target every device connected...
What environment do you consider the safest for online banking? Would you make your financial transactions solely in the safety of your...
By Clare Baldwin, James Pomfret and Jeremy Wagstaff HONG KONG/SINGAPORE (Reuters) – Almost a year after students ended pro-democracy street protests in...
Group also goes after the website of a whale hunting company Online activists associated with Anonymous took down five websites belonging to...
Emsisoft researchers creates decryption tool.Fabian Wosar of Emisoft has created a tool capable of decoding files encrypted by the DecryptorMax ransomware, also...
Short Bytes: Only very few members of the hacktivist collective Anonymous have been publicly identified. One such person is Gregg Housh, who recently...
Anonymous kicked started the operation #OpWhales and shut down almost all the Iceland government websites for about 13 hours as a protest against...
Short Bytes: After the unfortunate Paris attacks, online media outlets like Wired, Yahoo News, and The Telegraph uncovered a ‘secret ISIS OPSEC...
A couple (22-year-old man and a 22-year-old woman from Colchester, Essex) offering malware encryption services has been arrested by British police — The...
Researchers have found a vulnerability in VPN networks that could allow hackers or scammers to access real IPs of the users. Though,...
Short Bytes: Mac OS X has a very nice way to capture full or partial screen without any software, but many users are...
One day, as you’re busy surfing on one of your favorite online stores, you stumble upon a pair of chic shades …...
Short Bytes: The NSA will end its bulk phone spying program by 11:59 p.m. EST Saturday (4:59 a.m. GMT Sunday). This step is...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage