After experiencing an onslaught of DDoS attacks, which saw it hand over the ransom that was demanded, ProtonMail has once again been...
We’re your servants, says general counsel unconvincingly After spending months pressuring tech companies to add backdoors into their encryption software, the FBI...
Fake jQuery injections have been popular among hackers since jQuery itself went mainstream and became one of the most widely adopted JavaScript...
Follow-on attacks show capabilities “commonly possessed by state-sponsored actors.” A provider of end-to-end encrypted e-mail said it paid a ransom of almost...
The online hacktivist Anonymous released what they called a list of Ku Klux Klan members and sympathizers on Thursday. As reported earlier, the Anonymous...
A software development kit that has been provided by Baidu (A Chinese search engine) can easily be exploited for installing backdoors on...
Cyber-security vendors are revealing their statistics for the third quarter (Q3) of 2015, and a popular topic is DDoS attacks, a tactic...
IPB The encryption bothering parts of the UK’s Investigatory Powers Bill have left IT security experts flabbergasted. Introducing the draft internet surveillance...
Short Bytes: The humble Notepad of your laptop goes unappreciated many times. This little tool is capable of doing some amazing tricks...
A cybersecurity expert once told me something I’ll never forget: “don’t underestimate what bored teenagers can do.” A group teenagers that call...
Banks in the UK and US will be tested on how capable they are in coordinating a transatlantic response to a cyberattack.
What is the definition of DNS? DNS, which stands for Domain Name System, is used as the medium to translate domain names...
Customers of Russia’s biggest banks are under attack.Dell SecureWorks has detected an ongoing campaign that is targeting users of several Russian banks...
20,000 samples found impersonating apps from Twitter, Facebook, and others. Researchers have uncovered a new type of Android adware that’s virtually impossible...
Short Bytes: What is the worst thing that could happen when you hire a hacker to conduct some criminal activity? Yes, police...
The question of antivirus software being dead is one that doesn't seem to go away. Why is that? Distinguished ESET researcher Aryeh...
Even reports of crims offering signing-as-a-service. Underground cybercrooks are selling digital certificates that allow code signing of malicious instructions, creating a lucrative...
Our Remediation and Research teams are in constant communication and collaboration. It’s how we stay ahead of the latest threats, but it...
Google’s Nexus Android devices are considered the most secure by default since they’re guaranteed to receive all security patches for vulnerabilities found...
Denis Andzakovic, a security researcher for Security Assessment, has created a tool that can fool the KeePass password manager into exporting its...
Are Your SaaS Backups as Secure as Your Production Data?
MS Exchange Server Flaws Exploited to Deploy Keylogger in Targeted Attacks
SolarMarker Malware Evolves to Resist Takedown Attempts with Multi-Tiered Infrastructure
“Linguistic Lumberjack” Vulnerability Discovered in Popular Logging Utility Fluent Bit
Foxit PDF Reader Flaw Exploited by Hackers to Deliver Diverse Malware Arsenal
Defending Your Commits From Known CVEs With GitGuardian SCA And Git Hooks
Cyber Criminals Exploit GitHub and FileZilla to Deliver Malware Cocktail
Latrodectus Malware Loader Emerges as IcedID’s Successor in Phishing Campaigns
Grandoreiro Banking Trojan Resurfaces, Targeting Over 1,500 Banks Worldwide
Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking
China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT
Kimsuky APT Deploying Linux Backdoor Gomir in South Korean Cyber Attacks
New Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacks
North Korean Hackers Exploit Facebook Messenger in Targeted Malware Campaign
Cybercriminals Exploiting Microsoft’s Quick Assist Feature in Ransomware Attacks
Google Patches Yet Another Actively Exploited Chrome Zero-Day Vulnerability
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Android 15 Rolls Out Advanced Features to Protect Users from Scams and Malicious Apps
Turla Group Deploys LunarWeb and LunarMail Backdoors in Diplomatic Missions
(Cyber) Risk = Probability of Occurrence x Damage