Al-Hayat, an agency that spreads all the content relevant to ISIS on different online platforms has announced the ISIS intentions on moving...
The online hacktivist group Anonymous has declared a “total war” against the terrorist group and so-called Islamic State (IS, previously ISIS/ISIL) group. To keep up...
French authorities after the Paris attacks are busy trying to find the source using which the whole massacre was planned. Last Friday,...
Short Bytes: Microsoft has finally responded to the user feedback in the form of recognizing Windows 7 and 8.1 product keys to...
At PortSwigger, we regularly run pre-release builds of Burp Suite against an internal testbed of popular web applications to make sure it’s...
Often we come across times where binary reconstruction while analyzing malware / unpacking malware is required . Taking leverage of automated tools...
Microsoft squashes offline logic flaw that makes lost laptops dynamite. Blackhat Europe Synopsys security boffin Ian Haken says un-patched PCs in enterprises...
Expect a new ransomware version in the coming weeks.The Linux.Encoder.1 ransomware, a special strand that has a taste for Web hosting and...
Egyptian Hacker Uses njRAT Codebase to Create KillerRat — The RAT goes completely hidden upon scanning. A new Remote Access Trojan/RAT has...
Someone photoshopped this guy’s pic from an iPad to a Quran and the mainstream media took it as real and made it viral....
Earlier this week the servers of Brazilian Army got hacked leading to private details of around 7,000 military officials getting stolen. Hackers...
Going through Facebook profiles will now be a different experience with Facebook experimenting a new feature, which will allow anyone visiting user...
The online hacktivist group Anonymous has announced a new series of cyber attacks against the ISIS/ISIL terrorist group. This Friday, terrorists targeted...
VXers stuff evidence-purging malware in retailer stockings. Threat researchers are warning of two pieces of point of sales malware that have gone...
Attackers could have had full control over DT’s Web server. Independent Egyptian security researcher Ebrahim Hegazy has found another vulnerability, and this one...
Short Bytes: After facing tons of criticism over the new proposed rules governing the 5GHz spectrum devices (basically your WiFi routers), the...
Crafted image crashes apps, server processes. This will not be fun: the graphics processing library libpng has a vulnerability and needs to...
It didn’t take long for Anonymous members to rally and swear payback for the recent ISIS terror attacks that took place in...
A telephone tower-like device (IMSI-catcher) can be used for recording phone calls from the latest versions of Samsung Galaxy, demonstrated by two...
Short Bytes: In response to the Paris attacks, Hacktivist group Anonymous was quick to issue a warning to its long-time foe ISIS....
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams