The online hacktivist group Anonymous Belgian conducted a series of DDoS attacks on the official website of Belgian Prime Minister Charles Michel,...
Short Bytes: Shove extension for Chrome is made with a good intention of sharing the links with your friends instantly. But, you...
Do you know the USB devices we carry each day can be converted into a bomb? You must be thinking like “yeah whatever.”...
Banking trojans are ubiquitous and growing in number and sophistication, largely through trojan downloaders and webinjects. Here are four severe cases.
The maker of USB Killer is here with the USB Killer version 2.0 – a more advanced version of the computer frying...
Short Bytes: The maker of USB Killer is here with the USB Killer version 2.0 – a more advanced version of the...
Having your laptop stolen is the biggest nightmare anyone can face in the era of our gadget-centric lives. Here are some ways...
Short Bytes: Crypto backdoor entry isn’t the only way for the cops to access your data. You think your iPhone is the...
Depressingly familiar and stupid mistakes in EEG kit, health org’s storage of recorded brains. BruCon: Behold the future: attackers can already get...
America’s Thrift Stores said this week that it has been the victim of a malware-driven cyberattack by Eastern European criminals who stole...
The privacy community scored a victory in a year-long battle over the future of encryption: In internal discussions, the White House quietly...
A hacker going with the online handle of Kuroi SH hacked and defaced several domains of the United States based Uniformed Services...
Apple news (Currently in testing mode) has been taken down in China by the company itself. The reason behind this seems obvious:...
Short Bytes: In the third article of the “Steps to Effective Security” series, I’ll tell you 10 steps to defeat hacking attacks and...
Researchers identified a flaw in Cisco’s WebVPN — Hackers managed to install backdoors via two methods on the service — This weakness...
US Ports are still vulnerable to cyber attacks that release dangerous chemicals, cybersecurity in the maritime industry is crucial for Homeland security....
AndroidOS.SmsThief does what it says on the tin – acts as a thief through SMS, on Android. Mobile network security and threat...
Attackers could have fooled Kaspersky antivirus in blocking Windows Update or some of its own update servers A vulnerability that allowed abuse...
Security vendor interrupts hacking campaign targeting Israeli security firms, government agencies, and hospitals.Security experts have identified and isolated a series of attacks...
Singaporean telco’s customer premises equipment is a gateway to security hell. Thousands of routers mandated for use by a major Singaporean telco...
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment
How Safe is Your TinyProxy? Step-by-Step Guide to Exploiting Tinyproxy’s Zero Day Vulnerability
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications