In a previous article, we brought you news of Trump Hotels being breached by hackers. To update, we can now report that...
Short Bytes: The humble wireless router in your home, as you might not think, could be the biggest loophole in your personal...
Last week, news spread across the web (appearing in newsfeeds of many users) that Facebook is about to assign a fee for...
Short Bytes: The latest WinRAR SFX v5.21 update has a serious vulnerability that allows remote attackers to execute any malicious code on your...
Vulnerability allowed hackers to hijack active user sessions.Microsoft Exchange Server has been recently patched to fix an important security vulnerability which would...
Threat actors are using a previously discovered distributed denial-of-service (DDoS) attack tool dubbed XOR DDoS to launch upwards of 20 DoS attacks...
Short Bytes: As more and more Linux systems are going online, the threat to the once-secure Linux systems is increasing. In a...
The NSA whistleblower Edward Snowden has finally joined Twitter and within a few hours he has earned a verified badge along with...
SAP patched a dozen holes in its in-memory management system, HANA, that could have led to SQL injection attacks, cross-site scripting (XSS)...
A survey has found that most parents in the UK are keen to see a minimum age introduced for smartphone ownership.
Saudi Arabia’s Government’s decision to crucify Mohammed al-Nimr has prompted a strong response from the Hacktivist group Anonymous when various significant Saudi government websites were hacked...
Short Bytes: To address your privacy concerns, Silent Circle has tried to create the super-secure Android phone and its newest model Blackphone...
WinRAR, the popular file compression and decompression utility, has a security vulnerability that allows attackers to remotely execute code on the user’s...
Kovter Trojan can hide in Windows registry and does not need to be stored on the computer’s hard drive- claims Symantec —...
The Dyreza Trojan long ago ceased its exclusive focus on stealing banking credentials, and has been blamed for its part in attacks...
Fugitive US intelligence contractor Edward Snowden has opened an account on the social network website Twitter. His opening tweet was: “Can you...
Short Bytes: Do you know about the Darknet and TOR? Here’s an interesting piece of information if you are interested in the...
Short Bytes: In the second article of Getting Started With Raspberry Pi series on fossBytes, I’ll be telling you about all the...
Pirate Bay is online and playing a game of cat and mouse with IP regulators. Pirate Bay co-founder Gottfrid Svartholm Warg was released...
Short Bytes: Finally, Microsoft takes some time to address the widespread Windows 10 privacy concerns. In a blog post on Windows.com, a...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft