One of the Internet’s oldest and crudest attacks experiences a resurgence. A number of sites have been hit by distributed denial-of-service attacks...
If you would like to build your personal private chatting system without any hassle besides entering a different Address in your web...
The premium email provider FastMail has revealed that a cybercriminal has launched multiple DDoS attacks on its systems and made a ransom...
Short Bytes: Russia has yet again displayed stifling laws as it demanded the micro-blogging site Twitter to set up local data centres...
Short Bytes: In a blog post, Tor Director has outlined the unethical ways that were employed by FBI to unmask Tor users....
Recently, researchers from the Cheetah Mobile Security Lab have found a dangerous Trojan, dubbed Cloudsota, pre-installed on certain Android tablets. Tablets infected...
Soccer, or rather football aficionados in the UK may have had their computers infected whilst browsing the Premier League’s official fantasy website...
Recently, while researching attacks on targets in Thailand, Unit 42 discovered a tool that initially appeared to be a variant of the...
This post by SAP Product Security Response Team shares information on Patch Day Security Notes* that are released on second Tuesday of...
A ransomware infected several PC at the UK Parliament, for the first time a threat hit the internal computer network, the Parliamentary...
Halifax police forced to re-open investigation in a sexual assault case after Anonymous exposes the identity of the alleged culprit. The online...
Biohackers have unveiled something that could be termed as “Technology for future”. The technology is a silicone implant that is LED equipped...
Ethical hacking could be great fun if you know about these add-ons. The creation of penetration testing labs in Kali Linux or...
A court has given Facebook 48 hours to stop tracking people in Belgium who are not members of its social network. Facebook...
CryptoWall 4.0 has been released that displays a redesigned ransom note, new filenames, and now encrypts a file’s name along with its data. We...
Experts at Bitdefender have discovered a flaw in Linux Encryption Ransomware Linux.Encoder1 that exposes the decryption Key used to lock the files....
Coding mistakes in a malicious program that encrypts data mean anyone hit by the Power Worm virus will not be able to...
In April 2014 the cybersecurity world was rocked by the discovery of Heartbleed, the name given to a vulnerability found in one...
A Belgian court has ordered Facebook to stop tracking internet users within next 48 hours or they will impose fines of up...
A group of researchers from Checkpoint Security firm claimed that they have breached phishing servers that were used by the Rocket Kitten....
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams