Denis Andzakovic, a security researcher for Security Assessment, has created a tool that can fool the KeePass password manager into exporting its...
Software maker issued security patch hours after reports surfaced it was breached. Developers of the vBulletin software package for website forums released...
A US man who posted an advert on Craigslist requesting the services of a cybercriminal has been handed a two-year prison sentence....
Time after time we have experienced revolutions in our societies, in the way we work and thus in the Industry. In the...
Short Bytes: Kim Dotcom, the founder of notorious file-sharing website Megaupload, has said that he is working on an internet alternative called...
Short Bytes: Baidu, the Chinese analogous to Google has distributed a software development kit (SDK), Moplus, which has reportedly made over 100...
Short Bytes: Are you new to the world of Git and GitHub, finding it a little bit scary? Well, to erase these...
Wallets are becoming more integrated with other things. Soon, we might all use our phones as a way to pay for things....
Vodafone is the second British telecommunications company in two weeks to be on the receiving end of a serious hack. Yet another...
A group of hackers who claimed responsibility for the hacking of numerous government and even Chinese websites since 2012 has found a...
Earlier this month, exploit acquisition platform Zerodium debuted an iOS 9 bug bounty that would pay out up to three million dollars...
Researchers have discovered an Android malware disguising itself as a Microsoft word document which triggers a malicious code once opened. This Android malware was...
Short Bytes: Zerodium’s million dollar iOS 9 jailbreak bounty program has expired and it has resulted in a new iOS jailbreak. But,...
Short Bytes: Linus Torvalds says, “Talk is cheap. Show me the code.” What if you show him some code and it pisses...
Facebook’s is always changing and its team is adding new functionality every couple of months. With new changes there are chances of...
Short Bytes: Adobe Flash Player continues to remain the favorite target of the cyber attackers. The recent zero-day exploits that were earlier...
Timing attacks are an interesting part of computer security. As an extreme example, imagine that your computer took one second to verify...
Snapchat’s new term and conditions have resulted in outrage from its users and twitter has been flooded with tweets from users rejecting...
A laptop filled with data? An external HDD filled with even more data? There’s bound to be a phone – possibly two...
In the wake of the TalkTalk Scandal, Vodafone finally admitted that hackers did manage to steal around 20,000 Vodafone customers’ bank details....
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams