A Russian hacking group planned on launching cyberattacks against several banks around the world, according to SC Magazine.
Not all apps are worth your time and money. We Live Security looks at five signs the app you’re about to download...
The USA Freedom Act was passed by the House of Representatives on Wednesday and the bill, which is going to change the...
A Florida based woman thwarted a dangerous hostage situation by using the delivery instructions section of an online pizza ordering service by...
The website of celebrity TV chef and food activist Jamie Oliver has been compromised with malware for the third time this year,...
Ever paid attention to how much info Google Search has about you? Well, if you haven’t done so, now you can check...
On 11th May 2015, the President of Kenya (Uhuru Kenyatta) website was hacked where its homepage was replaced by hackers with one...
Hackers advertise their nefarious services to potential customers for as little as $90 for Gmail and $350 to access a target's Facebook...
Dropbox users beware — Cyber criminals are targeting Dropbox users with a fake email, asking them to click on a link to...
Can you believe there are several online forums who actually claim to provide hackers in case you want to get someone’s Website, Facebook,...
In a video released on Monday, Hackers linked with the Islamic State group ISIS are intimidating a chain of cyber-attacks in the...
TunnelBear is one of the most loved VPN (Virtual Proxy Network) services because of its simplicity and clean interface. Now, the company...
Remember Android logo peeing on Apple logo found on Google Maps in Rawalpindi, Pakistan? Well, Google didn’t like it and for now...
AlphaCrypt Crypto-Malware the actual mind blower is that it Looks like TeslaCrypt and acts like CryptoWall. the latest piece of ransomware with...
Internet censorship is the control or suppression of what can be accessed, published, or viewed on the Internet. It may be carried...
This guide offers you five informative tips on how best to avoid ransomware in your email, which is a common way for...
A cybersecurity firm is accused of deceiving potential clients in order to extort business, according to whistle blower testimony to the FTC.
Facebook’s astonishing “Video Scam” – ‘See What Happens to this Pregnant Lady’ inappropriately misusing “shock element” for users. A post appeared recently...
A former employee of P2P cyber security firm Tiversa, turned whistleblower spilled the beans that the firm hacks its customers in order to fake...
Two men were arrested last week for allegedly developing hacking software that steals user information and photos from the image-hosting website Photobucket.
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment