Taking Advantage of Hacking Team Leak, Hackers Target Users with Adobe Phishing Email. As you know Adobe flash is a software used...
The Pirate Bay is one of the most popular torrenting sites of the world, and it has constantly been into the limelight...
Last week we reported hackers are developing Android malware every 17 seconds, making it one of the most vulnerable OS ever. Now...
A Yemeni hacker going with the handle of “Lov3rDns” has hacked and defaced the official social network domain of U.S president Barack...
31-year old Lucas Chansler is set to serve 105 years, perhaps the remaining days of his life, in prison after admitting to...
Get ready to bid farewell to your favourite messaging apps. These could be the last days for Britons to use the immensely...
The suspected Chinese hackers have once again managed to break into the United State government’s personnel management agency, leaving more than 22...
Just in case you are not aware of Reddit-revolt, here’s an update: Last week Reddit “Ask Me Anything” moderator Victoria Taylor was...
The US Office of Personnel Management has admitted that the widely-publicised data breach in June was more wide-reaching than at first thought.
The infamous Sednit espionage group is currently using the Hacking Team exploits disclosed earlier this week to target eastern European institutions.
Do you know the meaning of term software rot or bit-rot? It’s the gradual deterioration in the performance of a software and...
Hackers have a passion for hacking, but the way they choose their targets is something hard to understand. Just like this unpredictable hack we...
This Sunday, in a massive data breach at the Hacking Team, about 400GB of internal documents, spyware source codes, and tools were...
Let’s Welcome the New and Upcoming Phishing Scam —“Internet Capacity Warning.” Internet users are receiving an email that claims to be sent...
Breaking into the music business is one thing. Breaking into Madonna's computer without permission is quite another.
The global Anonymous network is relatively much bigger than your actual anticipation, a recent visual analysis by a University of Copenhagen graduate...
The mysterious message Tweeted by Anonymous, the widely known hacktivist group, has left many wondering whether they were behind the cyberattack on NYSE,...
Adobe Systems has issued a sizeable security update with patches for 36 vulnerabilities, at least one of which is currently under attack...
Over 500,000 Android users targeted by phishing apps harvesting their Facebook credentials. ESET detects these trojans as Android/Spy.Feabme.A.
Tor is a free software that is widely used by people to protect their identity and avoid network surveillance. The Onion Router...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage