Google has been busy removing a number of apps from Google Play that are disguised as popular selections that are actually pushing...
Short Bytes: Qubes OS is a free and open-source software (FOSS) that takes the security standards to a new level. It makes use...
Short Bytes: Avast was detected with a serious zero-day exploit by a Google security expert. The antivirus software was vulnerable to malicious...
Researchers warned Tuesday the latest APT to make the rounds features a remote access Trojan that can effectively mitigate security measures on machines and grant...
Avast was vulnerable to malicious HTTPS connections. One of Google’s security experts found a zero-day exploit inside the Avast antivirus, which the company...
A group of Brazilian hackers took over a couple of government-owned domains on Sunday posing the question, if these websites are so easy...
Microsoft, at their Windows 10 Devices event in New York, unveiled the pricing and availability of the HoloLens Development Edition. During the...
Since joining Twitter, Edward Snowden is more active than ever. In his latest revelation, the whistleblower has claimed that the British intelligence agency...
It’s time to Pull your Money Out of the Banks- Suggests the Online Hacktivist Group — Anonymous Takes Hacktivism to Another Level. The...
ESET security researcher Lysa Myers looks at a few of the questions she has been hearing more often about the recent surfeit...
IKEA, KFC, H&M and 7-Eleven are just a few popular brands that are being exploited by cybercriminals via WhatsApp. We take a...
Support scams and fake alerts are still big business. We look at scammer psychology and a little parapsychology.
Linux.Wifatch’s creators call themselves The White Team.The Linux.Wifatch malware, also dubbed as the “vigilante malware” has been going around the Internet, infecting...
Short Bytes: China, in its effort to improve its security during the National Holiday, covered entire Beijing under video surveillance. In the...
The Subway system at the heart of Seoul, South Korea was hacked in 2014 and a local lawmaker claims that the culprit...
HDRoot is the work of the Winnti APT group. Hackers activating mainly in South-East Asia have developed a new bootkit trojan, which disguises...
Ruskies sling malicious packet to trigger denial of service. Positive Technologies researchers Timur Yunusov and Kirill Nesterov have found since-patched remote execution...
Group used Angler Exploit kit to push ransomware on unsuspecting Internet users. Security researchers have disrupted an online criminal operation they estimated...
Hackers are targeting users with fake PayPal app update email which actually comes with an embedded link of an Android banking malware....
Short Bytes: The Android 6.0 Marshmallow update party has begun and we are here with the complete list of devices that are getting...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft