Hey guys, I write how-to content at fossBytes on regular basis. The contents that I write are pretty simple and based on...
Responsible for a great deal of the hacking, spamming and malware every day: here are some of the worst botnets of all...
Short Bytes: Part of the computer science fraternity? Ever wished to rake in the big bucks? Chances are that you might have realised...
Even if you're not a customer of health insurer Anthem, your data could have been put at risk. Be on your guard.
MS Word’s Malicious Macro Facilitates Downloading of Vawtrak Trojan – This time attackers rely upon VBS file containing Execution Policy Bypass Flag....
Lately, an email from Amazon has been hitting the inbox of unsuspecting users all over the world. This email has been masqueraded...
The world renowned Lenovo Computer manufacturing company has been shipping laptops prepackaged with malware that makes you more vulnerable to hackers —...
A 51 year old man is facing a lengthy prison sentence in the United Kingdom after admitting to a series of distributed...
The online queuing system for the 40,000 tickets to the Burning Man festival was hacked by 200 people accessing a 'technical backdoor'...
This post is for so many of the people in the community asking for and having problems installing Kali Linux. Here is...
Remember Lizard Squad? Yes, the same Lizard Squad who shutdown PSN and Xbox Live last Christmas making the holidays one living hell for games....
A Saudi based “oppressed defenders” hacking group has taken down the online banking domain of Arab National Bank, early Monday. The cyber attack on ANB...
New Android malware transforms your Phone into a Spy while it is Off – New Android Malware threat has been discovered by...
With the recent reports making media headlines about how the NSA and GCHQ have compromised millions of SIM keys manufactured by Gemalto,...
Kris Jenner is reportedly being blackmailed over a naked video that was stolen from her iCloud and could be released in the...
[Updated] A recent update in the instant messaging app WhatsApp has rolled out the WhatsApp voice calling feature to everyone. Now, Whatsapp...
Women Stalked by Security Guards via CCTV – “Sleaze File” contains images of pretty women Five security guards of a high-profile shopping complex...
The US surveillance agency, National Security Agency (NSA) along with its British counterpart the Government Communications (GCHQ) has compromised one of the...
Researcher dedicated to debunking hoaxes and exposing scams, have discovered a phishing scam doing rounds on the Facebook. It comes as a...
It is somewhat a proven fact that Computer & Internet have brought a new era of productivity into the human life in...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft