The “Hacking Team” Security Company has been hacked and more than 400 GB of confidential info has been leaked by a group...
Hacking Team, a controversial company from Italy which specializes in selling powerful surveillance equipment to governments and their enforcement agencies, has been...
Do you want to code, find a direct way to communicate with the like-minded people and get some type of mentorship? Are...
Protecting customers from fake online transactions has always been a challenging task for the company’s security division, which has forced a popular...
Image: shutterstock Today is the world where people worry less about getting mugged on street and more on the internet. With the cyber...
An online gaming/gambling site lost $1 million in bitcoin to an attacker who exploited its random number generation (RNG) system. A leading...
The latest spam campaign is equipped with the Dridex banking malware and targeting company accountants through deceptive emails. According to Heimdal Security,...
Studies show women are more vulnerable to phishing scams than men and same has happened with Vivian Gabb who told media how she...
Back in the month of January, one of the most popular bitcoin exchange namely BitStamp was hacked which resulted in the stealing...
A 20-year-old Brazilian kid has been revealed as the maker of more than 100 banking trojans by the security firm Trend Micro....
We all know NSA is powerful. Getting into your email accounts and accessing all the private information that include your pictures, voice...
WikiLeaks founder Julian Assange has revealed many controversial documents in the past couple of weeks related to Germany and France. Recently he...
By the first quarter of 2015, hacker/cyber-attackers have optimized their efforts to design Android Malware to such an extent that every seventeen...
Plex Media Sever forum’s registered users received an email from the firm announcing that a breach of their system has exposed private...
Mark Zuckerberg vows to make Internet and Facebook available in remote communities through LASERS — Facebook Laser Beam is coming. Mark Zuckerberg, Facebook’s...
Web search has become synonymous with Google search. Other search engines like Bing and Yahoo are trying their best to give a...
In this era of government surveillance, remaining anonymous has become next to impossible for every Internet user. There is almost nothing we...
A new app could see Mastercard accepting selfies instead of passwords to make purchases online.
While you share an incredibly happy moment or a deep thought on social media or change to a new dashing profile picture,...
Not so long ago, Canadian servers were working under peace, but after the approval of controversial anti-terror bill C-51, there’s no peace...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage