Short bytes: General availability of Java 9 is announced by Oracle and it is coming on Sep 22nd, 2016. The major feature in...
IT’S enough to make Islamic State sit up and take notice, or at the very least get a little hot under the...
Embedded device mayhem as rivals share keys. More than 26,000 Cisco devices sold by Australia’s dominant telco Telstra are open to hijacking...
Vulnerability Test Suite (VTS) is a free application for Android that scans devices running the operating system for publicly-disclosed vulnerabilities. Publicly-disclosed vulnerabilities...
Security researcher warns hackers could steal personal information and turn the microphone of the doll into a surveillance device. Mattel’s latest Wi-Fi...
Short bytes: There are different ways to retrieve the WiFi password of the network that you are connected to. Out of these,...
Just a week after the news of ISIS moving their online operations to the dark web, one of their main websites has...
On Tuesday, Amazon started sending out emails to its users asking for a quick password reset, the reason is a possible breach...
According to an official document from the FBI, a Russian gang has been involved in a breach of 1.2 billion login credentials....
Short Bytes: Anonymous hacktivist group has just hacked an ISIS propaganda website on the dark web. Trolling ISIS and its supporters, the...
DRIDEX is steadily regaining its footing in the US just over a month after its takedown orchestrated by US and UK law enforcement...
SSH logins, server-side HTTPS certs baked in firmware. It’s what we all assumed, but quietly hoped wasn’t quite this bad. Lazy makers...
Over the last year, criminals in Russia found a way to steal 252 million Rubles ($3.8 million) from five unnamed banks, using a...
In short order, the newest version of Cryptowall has begun showing up in exploit kits. The SANS Internet Storm Center said on...
A certification tracking system (Credential Manager System) used by companies like Cisco, F5, IBM and Oracle has faced a data breach and...
Short Bytes: Budget smartphones are a very interesting smartphone segment where a customer looks for tons of features for a not-so-high price. As...
This introductory guide to online safety offers parents some useful security tips on how to protect their children.
A PoC shows the future dangers for smart TV sets.Many cyber-security vendors view ransomware as 2016’s biggest threat, and to help drive...
Short Bytes: Sometimes it takes too much effort to fetch a cup of coffee, replying a couple emails, and some other small...
Both Amazon and Apple are in the same boat.GNU.org has a category on its website named “Philosophy of the GNU Project” where...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft