Dyre Wolf malware, a dynamic campaign has been discovered by researchers, which already has raked in more than $1 million. This latest...
The ever-growing trend of selfies is now inching forward to hit a new milestone. It’s time when selfies are all set to...
The email informs the recipient that if your account is not verified in 24 hours then you will be termed as a...
Anonymous hackers from Ireland have vowed to target government of Ireland on 5th May 2015, shutting down its IT system and leaking...
Due to a major trust breach last week, Chinese digital certificate issuing authority CNNIC (Chinese Internet Network Information Center) is facing the...
Territorial Disputes result in hacking of Chinese Websites by Anonymous Filipino Group. The Filipino front of online hacktivist Anonymous has managed to hack...
Air France‘s National Personal Mutual (MNPAF) was hacked on Sunday for a brief time period, confirmed the airline’s spokesperson. The site’s homepage...
Wordpress sites are being targeted by a Pirate Bay clone set up by hackers to distribute malware and a banking trojan, reports...
An Indiana teen has pleaded guilty to his involvement in a hacking ring that is said to have stolen data worth more...
President Barack Obama has issued an executive order allowing economic sanctions against hackers outside the United States.
After attacking Indiana government website for passing Religious Freedom Restoration Act (RFRA), hackers have now started attacking anyone supporting the RFRA. The official...
Last week the Europen Union commission warned users to leave Facebook if they don’t want to be spied on – Now a Belgian...
JavaZone 2015 The meme, GIF and parody culture of the Internet appears to be more apparent for sweeping the popularity of TV...
Remember the time when Swedish police took down The Pirate Bay in late 2014? The online torrent files index and repository, IsoHunt announced...
Welcome to my tutorial, today i will be showing you how to get someone’s ip once you have the person’s RAT. In...
Cyber criminals are targeting Facebook users with yet another Phishing scam — This time users are receiving a warning message in their Facebook...
Information security has become an even more critical factor of the business model, as it protects the most essential asset: information.
The United States President Barack Obama announced a new sanctions program yesterday to counterattack the foreign hackers. President Obama’s sanctions program will...
Google has received more than 100,000 complaints this year regarding unwanted ad injectors that have infected browsers.
Despite the holiday season though, you can't guarantee that hackers and cybercriminals won't be on the hunt for weak and vulnerable social...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams