In an exclusive for We Live Security, Jean-Ian Boutin, a malware researcher at ESET, shares his thoughts on the past, present and...
Malware that was active for over a year could have ‘accessed payment card information as it was being inputted,’ Trump Hotel Collection...
Short Bytes: Canonical is organizing India’s first ever Ubuntu Hackathon in Bangalore between October 15-16, 2015. Know about different categories, great prizes...
Google today patched the latest round of Stagefright vulnerabilities in Android, pushing them out as part of its latest over-the-air update to...
Short Bytes: In a recent interview, Edward Snowden has said that spy agencies have lots of tools that could be used to...
Backdoor in Outlook Web Application operates inside target’s firewall. Researchers have uncovered advanced malware that can steal virtually all of a large...
On the heels of recent disclosures of ATM malware such as Suceful [1], Plotus [2] andPadpin [3] (aka Tyupkin), Proofpoint research has...
Security researchers Chris Valasek and Charlie Miller helped the world understand that late-model vehicles are vulnerable to cyber attacks. We have read...
YiSpecter malware infects iOS devices by exploiting private APIs — Reports suggest, Chinese and Taiwanese users of iOS devices have been affected the most. According...
Cybercrime is more aggressive and confrontational than it has ever been, Europol's latest Internet Organised Crime Threat Assessment (IOCTA) has stated.
Someone is hacking unprotected Wi-Fi routers everywhere — and forcing them to be on guard. Does your home Wi-Fi use a default...
Short Bytes: Intel has incorporated the new SGX security technology in its Skylake CPUs, further strengthening the platform. Intel’s Sixth generation super performers...
YOU MIGHT THINK that working on a secured floor in a 30-story office tower puts you out of reach of Wi-Fi hackers...
The post includes a detailed procedure to hack and decrypt WhatsApp Database remotely on rooted Android mobile devices. Very Interesting!. A few...
If you're looking to introduce your child to social networks and want peace of mind, look no further. Here are some of...
Short Bytes: Increasing data breaches have made the personal identifiable information (PII) market very hot. The latest report outlines the different aspects...
The malware spreads with the help of an adult movie player. Security researchers at Palo Alto Networks have discovered and analyzed malware that...
It was only old-fashioned detective work that forced Volkswagen to admit to the existence of its ‘defeat device’. And that should worry...
Hack Satellite comunication In this article we will cover satellite based hacking attack which has been used by hacking groups since...
In today world we use satellite communication in many respects and industries and we all know how important they are in our...
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment
How Safe is Your TinyProxy? Step-by-Step Guide to Exploiting Tinyproxy’s Zero Day Vulnerability
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications