Hackers leak data of over 7,000 officers. Hackers who declined to name themselves hacked the servers of the Brazilian Army, and later leaked...
Distributed via Word files and the Angler EK. Cyber-crooks are diversifying their activities by including as many threats as possible inside their malware-delivery...
CSI: Cyber is known more for absurd drama than technical coherence, but it’s a big deal that hacking’s become so visible that...
Point of sale malware has gotten more sophisticated as we inch closer to the two-year anniversary of the Target data breach. Now,...
Newsweek has revealed that Spotify (One of the giants of the Music industry) faced a hacking attack last week and thousands of...
The US government has started arresting people who are showing support for the so-called Islamic State (IS, previously ISIS/ISIL) on social media. Whether it be...
Short Bytes: A new discovery at the PacSec Conference at Tokyo unveiled a great threat prevailing in the Android OS that hands...
Although it's far from always possible to determine the perpetrators of a denial-of-service attack and bring them to justice, there are plenty...
Vulnerabilities in SAP and Oracle products expose companies to crippling attacks, oil market fraud or equipment sabotage. A talk delivered at the Black...
Edward Snowden has been offering advice on operational security to ordinary people, advocating, among other things, two-factor authentication and encryption.
Car hacking may sound like something out of the latest Die Hard or James Bond film, but it’s newsworthy, real and likely...
Avast confirms the recent Vizio Smart TV snooping scandal Security researchers at Avast have hacked a Vizio smart TV and gained access...
Google’s Chrome staff got in contact with the security researcher and has already started working on a fix A Chinese security researcher...
FEDERAL AUTHORITIES HAVE indicted four men on charges that they hacked into multiple financial institutions and operated a stock-pumping scheme and online...
More than a year ago, the Tor Project patched its software against a vulnerability being exploited by researchers at Carnegie Mellon University,...
One of the Internet’s oldest and crudest attacks experiences a resurgence. A number of sites have been hit by distributed denial-of-service attacks...
If you would like to build your personal private chatting system without any hassle besides entering a different Address in your web...
The premium email provider FastMail has revealed that a cybercriminal has launched multiple DDoS attacks on its systems and made a ransom...
Short Bytes: Russia has yet again displayed stifling laws as it demanded the micro-blogging site Twitter to set up local data centres...
Short Bytes: In a blog post, Tor Director has outlined the unethical ways that were employed by FBI to unmask Tor users....
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft