A silver Jaguar XFR parked in a parking lot in Auckland, New Zealand was stolen with the help of a hacking device that sends...
WhatsApp, one of the most popular online calling apps, has been exposed by a group of researchers who identified how app’s internal...
Ghosts, monsters and the living dead can all send a chill down one's spine. Ransomware, for some people, is just as spooky....
Short Bytes: Diebold has developed a concept ATM that reduces the use of plastic money for cash withdrawal to zero. The self-serving...
Short Bytes: Attackers are now using an android malware app which camouflages itself as a Microsoft Word document. The malware once triggered, scans...
Short Bytes: The Tor Project has announced the release of the beta version of its Tor Messenger that allows you to chat...
Cracking Wi-Fi passwords, spoofing accounts, and testing networks for exploits is all fun enough, but if you want to take the...
Authorities in several European countries announced they have coordinated an operation to arrest criminals using the popular DroidJack RAT. Android RATs are becoming...
600k customer identities have been stolen in 2014 and according to government officials thousands of Britons data available for sale in the...
Experts at Symantec have discovered a new variant of the Chikdos DDoS-Trojan that is targeting MySQL servers worldwide. There is a malware...
Thirteen homes in Germany were raided as part of the operation – Image by Thinkstock Police have raided homes in five European countries...
There’s another data breach to report – and it’s a big one, affecting approximately 13 million customers of the “free” web hosting...
Law enforcement agencies across Europe have searched homes this week, as part of an international crackdown against users of a notorious piece...
A security researcher (Troy Hunt), who owns the website (haveibeenpwned) have discovered a possible breach of webhosting service 000Webhost servers. Basically, hunt’s...
Short Bytes: Apple boasts one of the best workforces in the tech world with employees ranging from a software engineer to a...
A group of researchers have demonstrated how locations of Facebook and WhatsApp users can be exposed by a security flaw in 4G networks....
An 11-year-old girl from New York has set up her own business selling cryptographically secure passwords, using a technique known as diceware.
Can cars be hacked remotely or is the idea of remotely hackable cars still only a hypothetical threat? Evidence is presented to...
Short Bytes: Our innocent habit of copy-paste is reflected when we send the URLs of search pages as some reference to our...
ESET researchers receive and analyze thousands of new malware samples every day. Earlier this year, one of them caught our attention because...
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment
How Safe is Your TinyProxy? Step-by-Step Guide to Exploiting Tinyproxy’s Zero Day Vulnerability
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications