The latest ESET discovery of the first known Android lock-screen-type ransomware that spreads in the wild and sets the phone's PIN lock...
Short Bytes: A recent report from the Privacy International reveals a fake baby car sear that is being used by the Columbian...
Programming errors make 15.26 million accounts orders of magnitude faster to crack. When the Ashley Madison hackers leaked close to 100 gigabytes...
Joshua Drake, the researcher who found the so-called Stagefright vulnerability in Android, today released exploit code to the public, which he hopes...
A group of hackers that goes under the name of DD4BC, first spotted in September 2014, has recently intensified its activity, launching...
Poorly secured satellite-based Internet links are being abused by nation-state hackers, most notably by the Turla APT group, to hide command-and-control operations,...
If you feel continually threatened by hackers then this program will help in tracking the culprit and definitely offer you some relief. You...
Short Bytes: A developer named Yusheng has created an amazing infographic that shows the entire JavaScript language syntax into one single image. Take...
Short Bytes: Microsoft is heading to the court to battle the U.S. Department of Justice to protect a user’s data stored in the...
The L8NT could help law enforcement track and find Wi-Fi enabled gadgets. On Tuesday, local media reported that David Schwindt, a 14-year...
Potential Security Flaw In Obsolete CMS and Plugins Left Millions of Users Vulnerable To Ransomware. More than 142 million websites have been...
Short Bytes: Today, we’ve brought some security tips from the Linux Creators. Read the article that describes The Linux Foundation recommendations for...
The Android.Trojan.MKero.A malware is making a comeback in Androidland, and this time around, hackers found a method to bundle it with legitimate...
When auditing iOS kernel executable, we found that the code quality ofcom.apple.driver.AppleHDQGasGaugeControl is very bad. In this blog, we will disclose 3...
Microsoft today patched a vulnerability in its graphics component present in Windows, Office and Lync that has been publicly attacked, and is...
Russia’s Pawn Storm group uses a malware dropper based on the leaked Carberp source code. A group of hackers that target military...
A YouTube user ‘Sir.O’ wants you to understand clearly what the Microsoft Service Agreement’s Section 7B tries to convey.. and he did...
Android is one of the most vulnerable OS in the world — If you are an Android user you need to be...
The laser navigation system and sensors of driverless cars can be easily exploited by hackers as they can trick them into getting...
WhatsApp Web is a web-based extension of the WhatsApp application on your phone. The web application mirrors all messages sent and received,...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft