The suspected Chinese hackers have once again managed to break into the United State government’s personnel management agency, leaving more than 22...
Just in case you are not aware of Reddit-revolt, here’s an update: Last week Reddit “Ask Me Anything” moderator Victoria Taylor was...
The US Office of Personnel Management has admitted that the widely-publicised data breach in June was more wide-reaching than at first thought.
The infamous Sednit espionage group is currently using the Hacking Team exploits disclosed earlier this week to target eastern European institutions.
Do you know the meaning of term software rot or bit-rot? It’s the gradual deterioration in the performance of a software and...
Hackers have a passion for hacking, but the way they choose their targets is something hard to understand. Just like this unpredictable hack we...
This Sunday, in a massive data breach at the Hacking Team, about 400GB of internal documents, spyware source codes, and tools were...
Let’s Welcome the New and Upcoming Phishing Scam —“Internet Capacity Warning.” Internet users are receiving an email that claims to be sent...
Breaking into the music business is one thing. Breaking into Madonna's computer without permission is quite another.
The global Anonymous network is relatively much bigger than your actual anticipation, a recent visual analysis by a University of Copenhagen graduate...
The mysterious message Tweeted by Anonymous, the widely known hacktivist group, has left many wondering whether they were behind the cyberattack on NYSE,...
Adobe Systems has issued a sizeable security update with patches for 36 vulnerabilities, at least one of which is currently under attack...
Over 500,000 Android users targeted by phishing apps harvesting their Facebook credentials. ESET detects these trojans as Android/Spy.Feabme.A.
Tor is a free software that is widely used by people to protect their identity and avoid network surveillance. The Onion Router...
The infamous spyware dealer, Hacking Team, has now begun to complain that their recently leaked Remote Control System (RCS) spyware tool which...
The New Town photographs by Andrew Hammerand According to a report by IHS, there were 245 million surveillance cameras operating globally in...
When you have the power of anonymity, you can do things that are unimaginable for others. The hacktivist group Anonymous is well-known...
The purpose of this scam message is to steal Google Account Login credentials. Users are urged to click on a fake link...
Did you notice the pro-ISIS hackers are targeting high-profile websites without any restriction? Yesterday, we exclusively reported how the State Ministry for Euro-Atlantic...
An overheating computer spells trouble. You would want your girlfriend to be smoking hot but trust me, neither you want your computer...
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
When is One Vulnerability Scanner Not Enough?
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
How to Make Your Employees Your First Line of Cyber Defense
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan