We just got to know that a new phishing scam has started to make rounds on the popular social media network, Facebook....
Short Bytes: Many Windows users are facing reduced performance issues in Windows 10. This appears in the form of input lags and could...
In this tutorial we will teach you how to boot Kali Linux 2.0 in USB and Install it. Also Read: Download...
Remember the Anonymous hackers behind the massive World Trade Center (WTC) leak? Well, they are back with another breach. The online hacktivist...
Today, we are bringing to you our third article in the “Getting Started With Linux” series. The part III deals with the...
On Tuesday, a former United States embassy employee and a resident of Atlanta, Michael C. Ford has been accused of sextortion attempts...
Short Bytes: Google has released the final preview of Android Marshmallow 6.0 and you can download it right now and install it...
Last week, hackers breached into the servers of Web.com group, (a reputable online web services provider) and managed to access and steal...
The internet is arguably the new frontier for communication, collaboration and business but, with criminals also using it for ill-gotten gains, it...
University of Virginia the latest to suffer Hack Attack — The attack allegedly originated from China. This weekend the University of Virginia...
The latest trend of vehicle hacking started by the DefCon and BlackHat security conferences has ignited a battle between the car manufacturers...
Cybersecurity topics and panels were rated one of the “6 Best Things” at the recent Campus Tech conference, in Boston.
Short Bytes: Making an attempt to inform you about the market trends of salaries of software engineers, we bring you an infographic...
The Impact Team have released stolen Ashley Madison data on the dark web, which includes personal information belonging to 37 million users...
A group of Turkish hackers hacked and defaced the official website of Unicef India (The United Nations Children’s Fund) last Sunday. A...
Mumsnet, the phenomenally popular British parenting website, has suffered an attack from hackers which has seen users' accounts breached, and passwords stolen....
Impact Team, the group of hackers who earlier stole a huge amount of personal data of about 37 million customers from the...
Short Bytes: A researcher has recently demonstrated an easy Amazon Dash Button hack. By following some simple steps, you can use this...
A major security vulnerability study into modern cars has finally been released, two years after it was originally intended to be published.
With children gradually going back to school in Latin American regions, it’s time to remind our children of the importance of IT...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams