The online hacktivist Anonymous shut down 8824 Twitter accounts of ISIS members + followers in the first phase of OpParis — In...
Someone is using Anonymous’s name to spread rumors about ISIS planning to target different events worldwide. A Pastebin post posted by someone claiming to have a...
Hackers have again attacked PayPal but this time by making a clone site that even had an SSL certificate of the World...
Hacking group remains as focused as one week ago Quite a lot has happened after Anonymous declared cyber-war on ISIS members last...
ONLINE AD NETWORKS and search engines love it when you surf around. Everything you do—every page you load, every query you type—helps...
VMware has patched an information disclosure vulnerability affecting a number of its products that use Flex BlazeDS. The original vulnerability was discovered...
Rohit Jawa fools officer into revealing personal details. Police officers investigating an eBay scammer must have been very surprised when the criminal, in...
Short Bytes: In the past, Pakistani and India cyber hackers have been targeting each other by hacking different government websites. In the latest...
After calling Anonymous ‘Idiots’ ISIS issues guidelines to its cronies to protect from hackers like Anonymous The Islamic State militant ISIL who...
Starwood Hotels & Resorts Worldwide Inc said payment systems at 54 of its hotels in North America had been infected with a...
A Facebook bug is not a surprising thing to know about but Zuckerberg quitting his job as the Facebook’s CEO is not...
A 15-year-old guy in Plymouth has been arrested by British police on the charges of launching DDoS attacks and for sending false bomb...
Developers at LinkedIn fixed a persistent cross site scripting vulnerability in the social network this week that could have been exploited to...
Brazilian whacks Arris for easy-t-o-guess default password, fix promised fast. Security bod Bernardo Rodrigues has found a backdoor-within-a-backdoor affecting some 600,000 Arris...
Short Bytes: Tweeting your personal information on Twitter could result in an unwanted subscription of a torrent of cat facts, thanks to...
In this post, we will take a high and low-level look at the Pony Trojan, delivered through a recent spam campaign. During our case...
Mac malware is a thing. It’s real. Granted it hasn’t reached the critical mass of malicious code for Windows, but recent encounters...
How dare they demand we do exactly what we demand of them! The foreign rotters. A report laid before the US Congress...
Facebook has over 1 billion daily active users, with people in the US spending a staggering 27 hours on the social networking site every month. The company...
Visual ads directing users to malicious sites are things of past, cyber-criminals have added a new dimension to this: the video ads....
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks