Facebook has officially launched ThreatExchange - a collaborative social network where companies can share information on cybersecurity threats, in an effort to...
Hackers pieced together zero-day vulnerabilities in Flash and Internet Explorer 9+ to attack financial services and defense contractor employees visiting Forbes.com, according...
The TileArt app for Windows Phone takes phone customization to a whole new level. See these incredible parallax effects come to...
Every year for the last 12 years, the Microsoft Imagine Cup has driven young, bright minds from all over the globe to help...
A security researcher has revealed from a research of various data breaches, a collection of 10 million usernames and passwords. The leaked...
The developers at Offensive Security are back with yet another great version of Debian-derived Linux distribution Kali Linux version 1.10. Kali Linux 1.1.0 was...
Samsung decision to process voice commands in its latest Smart TV through cloud server has sparked a new debate on data retention,...
Remote Control Virus was used by the Hacker to Penetrate into Computer Systems and issue death threats to users. On Wednesday, the...
Is America's new Cyber Threat Intelligence Integration Center a step forward? Or a duplication of the National Cybersecurity and Communications Integration Center...
Why is Google giving you free Drive space? On the occasion of Safer Internet Day, Google is giving away a bit of...
The Microsoft Outlook app has been banned from use in the EU Parliament, according to emails from the parliament's IT department, seen...
The White House is creating a new agency to help counter cyberthreats, analyzing intelligence from around the government so it is better...
Two phone scams of a type that might be new to you: fake surveys asking dangerous questions, and a Londoning scam that...
The person who developed the free email encryption software Gnu Privacy Guard in 1997, which was used by famous NSA whistleblower Edward...
The official Twitter account of world renowned American based Newsweek Magazine was hacked by Cyber Caliphate, a pro-ISIS hacker who previously had hacked Malaysian Airlines...
What is the news? A security researcher has released 10 million usernames and passwords in public domain. Mark Burnett has collected this...
The online hacktivist Anonymous has claimed that it took down about 800 Twitter accounts and 12 Facebook pages belonging or somehow supporting the...
Today i’m going to teach you some basics of website hacking , so first , we going to learn about website defacement....
WhatsApp's privacy settings are "broken" and can be bypassed by downloading a simple bit of software, claims the Dutch developer behind proof-of-concept...
Security researchers have uncovered a trojan that evades sandboxes specifically targeted at corporate users, hidden in legitimate looking phishing email that apes...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks