The online hacktivist Anonymous released what they called a list of Ku Klux Klan members and sympathizers on Thursday. As reported earlier, the Anonymous...
A software development kit that has been provided by Baidu (A Chinese search engine) can easily be exploited for installing backdoors on...
Cyber-security vendors are revealing their statistics for the third quarter (Q3) of 2015, and a popular topic is DDoS attacks, a tactic...
IPB The encryption bothering parts of the UK’s Investigatory Powers Bill have left IT security experts flabbergasted. Introducing the draft internet surveillance...
Short Bytes: The humble Notepad of your laptop goes unappreciated many times. This little tool is capable of doing some amazing tricks...
A cybersecurity expert once told me something I’ll never forget: “don’t underestimate what bored teenagers can do.” A group teenagers that call...
Banks in the UK and US will be tested on how capable they are in coordinating a transatlantic response to a cyberattack.
What is the definition of DNS? DNS, which stands for Domain Name System, is used as the medium to translate domain names...
Customers of Russia’s biggest banks are under attack.Dell SecureWorks has detected an ongoing campaign that is targeting users of several Russian banks...
20,000 samples found impersonating apps from Twitter, Facebook, and others. Researchers have uncovered a new type of Android adware that’s virtually impossible...
Short Bytes: What is the worst thing that could happen when you hire a hacker to conduct some criminal activity? Yes, police...
The question of antivirus software being dead is one that doesn't seem to go away. Why is that? Distinguished ESET researcher Aryeh...
Even reports of crims offering signing-as-a-service. Underground cybercrooks are selling digital certificates that allow code signing of malicious instructions, creating a lucrative...
Our Remediation and Research teams are in constant communication and collaboration. It’s how we stay ahead of the latest threats, but it...
Google’s Nexus Android devices are considered the most secure by default since they’re guaranteed to receive all security patches for vulnerabilities found...
Denis Andzakovic, a security researcher for Security Assessment, has created a tool that can fool the KeePass password manager into exporting its...
Software maker issued security patch hours after reports surfaced it was breached. Developers of the vBulletin software package for website forums released...
A US man who posted an advert on Craigslist requesting the services of a cybercriminal has been handed a two-year prison sentence....
Time after time we have experienced revolutions in our societies, in the way we work and thus in the Industry. In the...
Short Bytes: Kim Dotcom, the founder of notorious file-sharing website Megaupload, has said that he is working on an internet alternative called...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft