Recently, researchers from the Cheetah Mobile Security Lab have found a dangerous Trojan, dubbed Cloudsota, pre-installed on certain Android tablets. Tablets infected...
Soccer, or rather football aficionados in the UK may have had their computers infected whilst browsing the Premier League’s official fantasy website...
Recently, while researching attacks on targets in Thailand, Unit 42 discovered a tool that initially appeared to be a variant of the...
This post by SAP Product Security Response Team shares information on Patch Day Security Notes* that are released on second Tuesday of...
A ransomware infected several PC at the UK Parliament, for the first time a threat hit the internal computer network, the Parliamentary...
Halifax police forced to re-open investigation in a sexual assault case after Anonymous exposes the identity of the alleged culprit. The online...
Biohackers have unveiled something that could be termed as “Technology for future”. The technology is a silicone implant that is LED equipped...
Ethical hacking could be great fun if you know about these add-ons. The creation of penetration testing labs in Kali Linux or...
A court has given Facebook 48 hours to stop tracking people in Belgium who are not members of its social network. Facebook...
CryptoWall 4.0 has been released that displays a redesigned ransom note, new filenames, and now encrypts a file’s name along with its data. We...
Experts at Bitdefender have discovered a flaw in Linux Encryption Ransomware Linux.Encoder1 that exposes the decryption Key used to lock the files....
Coding mistakes in a malicious program that encrypts data mean anyone hit by the Power Worm virus will not be able to...
In April 2014 the cybersecurity world was rocked by the discovery of Heartbleed, the name given to a vulnerability found in one...
A Belgian court has ordered Facebook to stop tracking internet users within next 48 hours or they will impose fines of up...
A group of researchers from Checkpoint Security firm claimed that they have breached phishing servers that were used by the Rocket Kitten....
Cyber cooks breached the security of British parliament’s secure network and hacked into many of its computer systems. The hack allowed the...
One of the biggest concerns parents have about the internet is the sites their children are browsing. Parental control tools can help...
A new study finds that current university students have a mature approach to social media that helps keep them safe from cybercrime.
Over the weekend, a reader (@flanvel) directed Salted Hashto a post on a Dark Web marketplace selling a number of questionable, if...
Short Bytes: Reuben Paul is a cybersecurity expert who lives in Austin, Texas, and attends third grade. He is the CEO of...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft