A Belgian court has ordered Facebook to stop tracking internet users within next 48 hours or they will impose fines of up...
A group of researchers from Checkpoint Security firm claimed that they have breached phishing servers that were used by the Rocket Kitten....
Cyber cooks breached the security of British parliament’s secure network and hacked into many of its computer systems. The hack allowed the...
One of the biggest concerns parents have about the internet is the sites their children are browsing. Parental control tools can help...
A new study finds that current university students have a mature approach to social media that helps keep them safe from cybercrime.
Over the weekend, a reader (@flanvel) directed Salted Hashto a post on a Dark Web marketplace selling a number of questionable, if...
Short Bytes: Reuben Paul is a cybersecurity expert who lives in Austin, Texas, and attends third grade. He is the CEO of...
This remote access trojan (RAT) has capabilities ranging from manipulating the registry to opening a reverse shell. From stealing credentials stored in...
A hacker going by the handle of His Royal Gingerness (HRG) hacked into the official website of Norwich International Airport last month...
Critical business applications such as SAP and Oracle ERP products process and store the Fortune 2000’s most critical data, yet spur relatively...
All Ubuntu users are urged to update as soon as possible. Canonical has just published four Ubuntu Security Notices that detail a recent...
NSA discloses 91 percent of the zero-day bugs it finds in the online systems to its manufacturers while it keeps the 9...
The best tool for cyber criminals with limited social engineering skills is tricking users into phishing scams and it doesn’t matter if...
CYBERTHIEVES hacked into the parliament’s secure computer network and used sensitive files to hold an MP to ransom, it has been revealed....
Short Bytes: Rusian engineers have created an ultimate data security device for you as a last line of defence. A USB Killer...
Short Bytes: DDoS attacks are targeting the networks and websites all over the world relentlessly. In the past three mnths, there has...
Report: Germany, France, Japan contract hopefuls spotted multiple attacks. Hacking attempts are forcing bidders in Germany, France, and Japan for Australia’s A$50...
Daesh’s cyber squad hacks over 54,000 Twitter accounts In the current era, there is no such thing that we have come across...
Short Bytes: Windows 10 comes with better options to keep an eye on your devices and ensure that your every work session...
The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to automate the Evil Twin Attack. The Infernal-Twin...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks