At PortSwigger, we regularly run pre-release builds of Burp Suite against an internal testbed of popular web applications to make sure it’s...
Often we come across times where binary reconstruction while analyzing malware / unpacking malware is required . Taking leverage of automated tools...
Microsoft squashes offline logic flaw that makes lost laptops dynamite. Blackhat Europe Synopsys security boffin Ian Haken says un-patched PCs in enterprises...
Expect a new ransomware version in the coming weeks.The Linux.Encoder.1 ransomware, a special strand that has a taste for Web hosting and...
Egyptian Hacker Uses njRAT Codebase to Create KillerRat — The RAT goes completely hidden upon scanning. A new Remote Access Trojan/RAT has...
Someone photoshopped this guy’s pic from an iPad to a Quran and the mainstream media took it as real and made it viral....
Earlier this week the servers of Brazilian Army got hacked leading to private details of around 7,000 military officials getting stolen. Hackers...
Going through Facebook profiles will now be a different experience with Facebook experimenting a new feature, which will allow anyone visiting user...
The online hacktivist group Anonymous has announced a new series of cyber attacks against the ISIS/ISIL terrorist group. This Friday, terrorists targeted...
VXers stuff evidence-purging malware in retailer stockings. Threat researchers are warning of two pieces of point of sales malware that have gone...
Attackers could have had full control over DT’s Web server. Independent Egyptian security researcher Ebrahim Hegazy has found another vulnerability, and this one...
Short Bytes: After facing tons of criticism over the new proposed rules governing the 5GHz spectrum devices (basically your WiFi routers), the...
Crafted image crashes apps, server processes. This will not be fun: the graphics processing library libpng has a vulnerability and needs to...
It didn’t take long for Anonymous members to rally and swear payback for the recent ISIS terror attacks that took place in...
A telephone tower-like device (IMSI-catcher) can be used for recording phone calls from the latest versions of Samsung Galaxy, demonstrated by two...
Short Bytes: In response to the Paris attacks, Hacktivist group Anonymous was quick to issue a warning to its long-time foe ISIS....
Just hours before the Paris attacks, Facebook blocked a group “Report ISIS accounts” that was made by anonymous members for unmasking ISIS...
Short Bytes: The popularity of programming languages is measured using various factors. The TIOBE index is often used as the best way...
Smartphones have taken our lives to a different level, besides helping us to connect with others, they also save lives; just like...
Facebook’s Photo Magic Can Scan Users’ Camera Roll to find Photos of their Friends — We learned about Facebook’s new feature called...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment