The Vawtrak bug back and meaner than ever, say Proofpoint researchers. A once-dormant banking trojan has reared its ugly head once again,...
The virulent Dridex malware poses a serious threat to online bankers in the UK, according to the National Crime Agency. Internet users...
Putrid Piper picked apart a packet for just $15. KU Leuven Phd student Mathy Vanhoef has smashed conventional wireless security thought by...
Flat, firewall-free network was a walk in the park, boffins say. Cyber Defence Summit An un-named Casino with next-to-no security has lost...
Attacks used to hijack end users’ computers when they visit booby-trapped sites. Attackers are exploiting a previously unknown vulnerability in fully patched...
The online hacktivist group Anonymous Belgian conducted a series of DDoS attacks on the official website of Belgian Prime Minister Charles Michel,...
Short Bytes: Shove extension for Chrome is made with a good intention of sharing the links with your friends instantly. But, you...
Do you know the USB devices we carry each day can be converted into a bomb? You must be thinking like “yeah whatever.”...
Banking trojans are ubiquitous and growing in number and sophistication, largely through trojan downloaders and webinjects. Here are four severe cases.
The maker of USB Killer is here with the USB Killer version 2.0 – a more advanced version of the computer frying...
Short Bytes: The maker of USB Killer is here with the USB Killer version 2.0 – a more advanced version of the...
Having your laptop stolen is the biggest nightmare anyone can face in the era of our gadget-centric lives. Here are some ways...
Short Bytes: Crypto backdoor entry isn’t the only way for the cops to access your data. You think your iPhone is the...
Depressingly familiar and stupid mistakes in EEG kit, health org’s storage of recorded brains. BruCon: Behold the future: attackers can already get...
America’s Thrift Stores said this week that it has been the victim of a malware-driven cyberattack by Eastern European criminals who stole...
The privacy community scored a victory in a year-long battle over the future of encryption: In internal discussions, the White House quietly...
A hacker going with the online handle of Kuroi SH hacked and defaced several domains of the United States based Uniformed Services...
Apple news (Currently in testing mode) has been taken down in China by the company itself. The reason behind this seems obvious:...
Short Bytes: In the third article of the “Steps to Effective Security” series, I’ll tell you 10 steps to defeat hacking attacks and...
Researchers identified a flaw in Cisco’s WebVPN — Hackers managed to install backdoors via two methods on the service — This weakness...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft