The US Office of Personnel Management has admitted that the widely-publicised data breach in June was more wide-reaching than at first thought.
The infamous Sednit espionage group is currently using the Hacking Team exploits disclosed earlier this week to target eastern European institutions.
Do you know the meaning of term software rot or bit-rot? It’s the gradual deterioration in the performance of a software and...
Hackers have a passion for hacking, but the way they choose their targets is something hard to understand. Just like this unpredictable hack we...
This Sunday, in a massive data breach at the Hacking Team, about 400GB of internal documents, spyware source codes, and tools were...
Let’s Welcome the New and Upcoming Phishing Scam —“Internet Capacity Warning.” Internet users are receiving an email that claims to be sent...
Breaking into the music business is one thing. Breaking into Madonna's computer without permission is quite another.
The global Anonymous network is relatively much bigger than your actual anticipation, a recent visual analysis by a University of Copenhagen graduate...
The mysterious message Tweeted by Anonymous, the widely known hacktivist group, has left many wondering whether they were behind the cyberattack on NYSE,...
Adobe Systems has issued a sizeable security update with patches for 36 vulnerabilities, at least one of which is currently under attack...
Over 500,000 Android users targeted by phishing apps harvesting their Facebook credentials. ESET detects these trojans as Android/Spy.Feabme.A.
Tor is a free software that is widely used by people to protect their identity and avoid network surveillance. The Onion Router...
The infamous spyware dealer, Hacking Team, has now begun to complain that their recently leaked Remote Control System (RCS) spyware tool which...
The New Town photographs by Andrew Hammerand According to a report by IHS, there were 245 million surveillance cameras operating globally in...
When you have the power of anonymity, you can do things that are unimaginable for others. The hacktivist group Anonymous is well-known...
The purpose of this scam message is to steal Google Account Login credentials. Users are urged to click on a fake link...
Did you notice the pro-ISIS hackers are targeting high-profile websites without any restriction? Yesterday, we exclusively reported how the State Ministry for Euro-Atlantic...
An overheating computer spells trouble. You would want your girlfriend to be smoking hot but trust me, neither you want your computer...
We all know that one of the basic procedures to keep our computer system secure and free from viruses and malware is...
Ever since its debut in the year 2013, Kali Linux users were waiting for a new and revamped version of the hack-friendly...
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files
Iranian MuddyWater Hackers Adopt New C2 Tool ‘DarkBeatC2’ in Latest Campaign
Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack
Sneaky Credit Card Skimmer Disguised as Harmless Facebook Tracker
U.S. Federal Agencies Ordered to Hunt for Signs of Microsoft Breach and Mitigate Risks
TA547 Phishing Attack Hits German Firms with Rhadamanthys Stealer
Python’s PyPI Reveals Its Secrets