Google has been busy removing a number of apps from Google Play that are disguised as popular selections that are actually pushing...
Short Bytes: Qubes OS is a free and open-source software (FOSS) that takes the security standards to a new level. It makes use...
Short Bytes: Avast was detected with a serious zero-day exploit by a Google security expert. The antivirus software was vulnerable to malicious...
Researchers warned Tuesday the latest APT to make the rounds features a remote access Trojan that can effectively mitigate security measures on machines and grant...
Avast was vulnerable to malicious HTTPS connections. One of Google’s security experts found a zero-day exploit inside the Avast antivirus, which the company...
A group of Brazilian hackers took over a couple of government-owned domains on Sunday posing the question, if these websites are so easy...
Microsoft, at their Windows 10 Devices event in New York, unveiled the pricing and availability of the HoloLens Development Edition. During the...
Since joining Twitter, Edward Snowden is more active than ever. In his latest revelation, the whistleblower has claimed that the British intelligence agency...
It’s time to Pull your Money Out of the Banks- Suggests the Online Hacktivist Group — Anonymous Takes Hacktivism to Another Level. The...
ESET security researcher Lysa Myers looks at a few of the questions she has been hearing more often about the recent surfeit...
IKEA, KFC, H&M and 7-Eleven are just a few popular brands that are being exploited by cybercriminals via WhatsApp. We take a...
Support scams and fake alerts are still big business. We look at scammer psychology and a little parapsychology.
Linux.Wifatch’s creators call themselves The White Team.The Linux.Wifatch malware, also dubbed as the “vigilante malware” has been going around the Internet, infecting...
Short Bytes: China, in its effort to improve its security during the National Holiday, covered entire Beijing under video surveillance. In the...
The Subway system at the heart of Seoul, South Korea was hacked in 2014 and a local lawmaker claims that the culprit...
HDRoot is the work of the Winnti APT group. Hackers activating mainly in South-East Asia have developed a new bootkit trojan, which disguises...
Ruskies sling malicious packet to trigger denial of service. Positive Technologies researchers Timur Yunusov and Kirill Nesterov have found since-patched remote execution...
Group used Angler Exploit kit to push ransomware on unsuspecting Internet users. Security researchers have disrupted an online criminal operation they estimated...
Hackers are targeting users with fake PayPal app update email which actually comes with an embedded link of an Android banking malware....
Short Bytes: The Android 6.0 Marshmallow update party has begun and we are here with the complete list of devices that are getting...
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files
Iranian MuddyWater Hackers Adopt New C2 Tool ‘DarkBeatC2’ in Latest Campaign
Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack
Sneaky Credit Card Skimmer Disguised as Harmless Facebook Tracker
U.S. Federal Agencies Ordered to Hunt for Signs of Microsoft Breach and Mitigate Risks
TA547 Phishing Attack Hits German Firms with Rhadamanthys Stealer
Python’s PyPI Reveals Its Secrets