China to Use Stronger Weapons to Censor the Web and it is called Great Cannon — It can block websites and interrupt...
Ransomware equipped with encryption capabilities has been victimizing police departments rather indiscriminately nowadays. Although paying ransom to hackers is not recommended because it...
Feels good to have lots of options to choose from, right? Then why stick to just one Operating System for a lifetime,...
Online hacktivist Anonymous has breached into an Israeli gun shop website (lhbltd.com) and leaked login credentials plus personal details of its local and...
Is ISIS Behind BBC’s ‘Operational error’ that Interrupted its Broadcast and Left presenter flustered? Supposedly, BBC News Channel fell prey to a...
Following the footsteps of Microsoft, Amazon has launched its first product for machine learning service. At the AWS Summit in San Francisco,...
In order to disperse protesters, Police in India will now use drones equipped with pepper spray. Is it possible to register police...
Facebook can Track Non-Users through ‘a bug’ — Working to fix it as fast as possible. Researchers at Facebook identified a “bug”...
Anonymous hacked several Chinese government websites including the Hunan (a province in China) Police Academy website in solidarity with pro-democracy protesters in Hong Kong....
The Internet was lit up by John Oliver’s interview with Edward Snowden since the host actually managed to make his chat subject...
Two officers from Georgia’s correction facility had to resign when the picture of a beaten teen inmate having a leash bent around...
Facebook is back in the news, this time again for violating its users’ privacy by gathering a huge mass of facial data. A class-action...
The US Federal Bureau of Investigation (FBI) has warned the WordPress users and urged them to patch their plugins of the content...
Australia’s Bendigo Bank is apparently sending out emails titled “Morning Update” to users. The email contains the staff member’s name as well...
AnonGhost hacktivist group’s leader and founder, Mauritania Attacker, revealed on Tuesday that his team has funded Palestinian charities through stolen Israeli credit...
The reformed conman that the 2002 film 'Catch Me If You Can' is based on has told The Times that anyone living...
A Chrome extension designed for taking and annotating screenshots has been found to be leaking sensitive data from its 1.2 million users.
Vifm What is Vifm (Vi File Manager)? Vifm is a ncurses library based file manager for Linux which allows you to perform almost...
So everyone knows that the big federal agencies and organizations like CIA, NSA and FBI are the one indulged in the mass...
The Operation Buhtrap campaign targets a wide range of Russian banks, used several different code signing certificates and implements evasive methods to...
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
Compromising Cryptographic Key Security Through PuTTY: A Deep Dive into CVE-2024-31497
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
FTC Fines Mental Health Startup Cerebral $7 Million for Major Privacy Violations
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks
Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files