Skype users have been advised by Microsoft to change their passwords following reports that 'spoofed' messages are being sent without user permission.
How cool would it be if somehow your parents were Pitt’s and ended up to name you Brad, or a simple Messi...
The 37 million users of hacked infidelity site Ashley Madison are at risk of having their names and private details leaked, reports...
Windows 10 is one of most talked about topics on various online forums. Microsoft is leaving no stone unturned to achieve its...
Online cheating website AshleyMadison.com has been hacked, and as a result, large chunks of data has been stolen. The compromised data has...
“How Government secretly read your e-mails with this insane law?“ “Snowden’s Revelations: XKEYSCORE is NSA’s search engine.” “Real-Time Cyber Attacks across the globe. ““NSA’s...
This is the 3rd post in the series covering top open source projects by most popular companies in the world. Today, we...
Pakistani President Mamnoon Hussain’s website has been hacked by Bangladeshi hackers — 72 other Pakistani government websites have been hacked as well....
Millions of Windows XP users are now left vulnerable to malware attacks as Microsoft has decided to terminate support and security updates...
The world is getting scarier each day. And I don’t mean the terrorist attacks or cyber threats or global warming, or least...
With Windows 10’s Windows Hello feature, you will be able to log into your PCs without any password. Windows Hello users to...
Microsoft Azure cloud platform is very popular among Linux users and now Microsoft has announced that it will be offering limited support...
iCloud Drive is one of the most-used Apple services as it’s a Dropbox-like solution to keep all your devices’ data in sync....
A Morrisons employee with a grudge was responsible for posting personal data of nearly 100,000 staff onto the internet, a court heard.
Earlier this month, as a part of the massive breach at the infamous Hacking Team, numerous documents were leaked. Since then, analysts...
About two weeks ago, we reported about the Raspberry Pi 2 based WiFi router that provided anonymous WiFi by putting you 2.5...
British teen Seth Nolan Mcdonagh, aka "narko" has been sentenced for his role in a 2013 attack which slowed the internet around...
United Airlines has paid out two million flight miles to two security researchers who uncovered 14 separate vulnerabilities in the company’s operation.
Welcome to the second post of the series covering top open source projects by most popular companies in the world. Last time,...
The American security Agency NSA is infamous for its mass surveillance programs. Every alternate day, we are greeted with new revelations regarding...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment