This post by SAP Product Security Response Team shares information on Patch Day Security Notes* that are released on second Tuesday of...
A ransomware infected several PC at the UK Parliament, for the first time a threat hit the internal computer network, the Parliamentary...
Halifax police forced to re-open investigation in a sexual assault case after Anonymous exposes the identity of the alleged culprit. The online...
Biohackers have unveiled something that could be termed as “Technology for future”. The technology is a silicone implant that is LED equipped...
Ethical hacking could be great fun if you know about these add-ons. The creation of penetration testing labs in Kali Linux or...
A court has given Facebook 48 hours to stop tracking people in Belgium who are not members of its social network. Facebook...
CryptoWall 4.0 has been released that displays a redesigned ransom note, new filenames, and now encrypts a file’s name along with its data. We...
Experts at Bitdefender have discovered a flaw in Linux Encryption Ransomware Linux.Encoder1 that exposes the decryption Key used to lock the files....
Coding mistakes in a malicious program that encrypts data mean anyone hit by the Power Worm virus will not be able to...
In April 2014 the cybersecurity world was rocked by the discovery of Heartbleed, the name given to a vulnerability found in one...
A Belgian court has ordered Facebook to stop tracking internet users within next 48 hours or they will impose fines of up...
A group of researchers from Checkpoint Security firm claimed that they have breached phishing servers that were used by the Rocket Kitten....
Cyber cooks breached the security of British parliament’s secure network and hacked into many of its computer systems. The hack allowed the...
One of the biggest concerns parents have about the internet is the sites their children are browsing. Parental control tools can help...
A new study finds that current university students have a mature approach to social media that helps keep them safe from cybercrime.
Over the weekend, a reader (@flanvel) directed Salted Hashto a post on a Dark Web marketplace selling a number of questionable, if...
Short Bytes: Reuben Paul is a cybersecurity expert who lives in Austin, Texas, and attends third grade. He is the CEO of...
This remote access trojan (RAT) has capabilities ranging from manipulating the registry to opening a reverse shell. From stealing credentials stored in...
A hacker going by the handle of His Royal Gingerness (HRG) hacked into the official website of Norwich International Airport last month...
Critical business applications such as SAP and Oracle ERP products process and store the Fortune 2000’s most critical data, yet spur relatively...
Key Lesson from Microsoft’s Password Spray Hack: Secure Every Account
AWS Patches Critical ‘FlowFixation’ Bug in Airflow Service to Prevent Session Hijacking
China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws
Massive Sign1 Campaign Infects 39,000+ WordPress Sites with Scam Redirects
Russian Hackers May Have Targeted Ukrainian Telecoms with Upgraded ‘AcidPour’ Malware
AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials
Making Sense of Operational Technology Attacks: The Past, Present, and Future
Ivanti Releases Urgent Fix for Critical Sentry RCE Vulnerability
Atlassian Releases Fixes for Over 2 Dozen Flaws, Including Critical Bamboo Bug
TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks
Ukraine Arrests Trio for Hijacking Over 100 Million Email and Instagram Accounts
APIs Drive the Majority of Internet Traffic and Cybercriminals are Taking Advantage
From Deepfakes to Malware: AI’s Expanding Role in Cyber Attacks
Crafting and Communicating Your Cybersecurity Strategy for Board Buy-In
Suspected Russian Data-Wiping ‘AcidPour’ Malware Targeting Linux x86 Devices
New Phishing Attack Uses Clever Microsoft Office Trick to Deploy NetSupport RAT
New DEEP#GOSU Malware Campaign Targets Windows Users with Advanced Tactics
Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool
Hackers Using Sneaky HTML Smuggling to Deliver Malware via Fake Google Sites
WordPress Admins Urged to Remove miniOrange Plugins Due to Critical Flaw