The deputy director of the US National Security Agency (NSA), Richard Ledgett, has warned of the increasing danger of destructive cyber attacks...
Two weeks after authorities announced they had taken down the botnet behind the banking malware Dridex, new research suggests the threat is alive and...
Short Bytes: A 15-year-old has been arrested in Northern Ireland in connection with the cyber-attack on the TalkTalk’s website. This news of 15-year-old...
Short Bytes: By abusing the HTTP policies of your web browser, a security engineer has devised a new technique to sniff the...
Short Bytes: Enigmaze Secure Password Generating Grid System Manager has come up with the most efficient and innovative ways of generating new and...
Short Bytes: In another attempt to clear the confusion clouds, Microsoft said that users shouldn’t worry about the Windows 10 data collection...
Short Bytes: OpenFace, the open source face recognition technology developed by the researchers at the Carnegie Mellon University, has been rolled out. The...
Qubes OS is different than other operating systems starting right from the kernel. Operating systems such as Windows, Linux, BSD, and OSX...
Short Bytes: The US District Court has dismissed a lawsuit by Wikimedia against the NSA surveillance. The District Court ruled that the lawsuit...
Short Bytes: Accomplished Google hacker James Forshaw thinks that Microsoft has delivered a “good” operating system, but it has failed to ensure...
TalkTalk, a British phone and broadband provider with more than four million customers, disclosed Friday that intruders had hacked its Web site...
Researchers have found out that hackers took over around 900 CCTV cameras with weak login credentials and used them as a DDosS...
Cyber criminals are targeting Apple users with yet another sophisticated phishing scam where users are asked to click a link for payment refund....
Short Bytes: With the ever advancing fast-paced technology, we are now more open to the more intimate devices like wearables. They are...
Short Bytes: Driven by the open source philosophy, two Facebook interns won $5,000 at a Facebook Hackathon. They performed a codeless hack...
Anonymous, the world famous hacktivist group, has now declared war on the Thai government due to its implementation of single internet gateway...
Short Bytes: Mira Modi, an 11-year-old girl, has started a business of selling cryptographically secure passwords for $2 each. She generated Diceware...
Short Bytes: As the latest employee surveys indicate, Facebook is one of the best places to work for. But, getting a job...
According to a study carried out by the Citizen Lab (a research department at the University of Toronto), FinFisher is the most...
Short Bytes: As we advance more and more in artificial intelligence and related technologies, we must solve some complex ethical problems. A...
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment
How Safe is Your TinyProxy? Step-by-Step Guide to Exploiting Tinyproxy’s Zero Day Vulnerability
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications