Hackers leak data of over 7,000 officers. Hackers who declined to name themselves hacked the servers of the Brazilian Army, and later leaked...
Distributed via Word files and the Angler EK. Cyber-crooks are diversifying their activities by including as many threats as possible inside their malware-delivery...
CSI: Cyber is known more for absurd drama than technical coherence, but it’s a big deal that hacking’s become so visible that...
Point of sale malware has gotten more sophisticated as we inch closer to the two-year anniversary of the Target data breach. Now,...
Newsweek has revealed that Spotify (One of the giants of the Music industry) faced a hacking attack last week and thousands of...
The US government has started arresting people who are showing support for the so-called Islamic State (IS, previously ISIS/ISIL) on social media. Whether it be...
Short Bytes: A new discovery at the PacSec Conference at Tokyo unveiled a great threat prevailing in the Android OS that hands...
Although it's far from always possible to determine the perpetrators of a denial-of-service attack and bring them to justice, there are plenty...
Vulnerabilities in SAP and Oracle products expose companies to crippling attacks, oil market fraud or equipment sabotage. A talk delivered at the Black...
Edward Snowden has been offering advice on operational security to ordinary people, advocating, among other things, two-factor authentication and encryption.
Car hacking may sound like something out of the latest Die Hard or James Bond film, but it’s newsworthy, real and likely...
Avast confirms the recent Vizio Smart TV snooping scandal Security researchers at Avast have hacked a Vizio smart TV and gained access...
Google’s Chrome staff got in contact with the security researcher and has already started working on a fix A Chinese security researcher...
FEDERAL AUTHORITIES HAVE indicted four men on charges that they hacked into multiple financial institutions and operated a stock-pumping scheme and online...
More than a year ago, the Tor Project patched its software against a vulnerability being exploited by researchers at Carnegie Mellon University,...
One of the Internet’s oldest and crudest attacks experiences a resurgence. A number of sites have been hit by distributed denial-of-service attacks...
If you would like to build your personal private chatting system without any hassle besides entering a different Address in your web...
The premium email provider FastMail has revealed that a cybercriminal has launched multiple DDoS attacks on its systems and made a ransom...
Short Bytes: Russia has yet again displayed stifling laws as it demanded the micro-blogging site Twitter to set up local data centres...
Short Bytes: In a blog post, Tor Director has outlined the unethical ways that were employed by FBI to unmask Tor users....
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment