It seems that the tiny county in southeastern Virginia is the new victim of the pro-ISIS hackers as Team System DZ hacked...
This news bit strengthens the presumption that hackers can make use of just about anything to fulfill their malicious motives. After the...
Originally this Russian website was designed for purely non-controversial spear-fishing activities, but now its log-in page has been compromised and displays a...
As the aftermath of the attack on French satirical magazine Charlie Hebdo, more than 19,000 French websites have been hacked by some...
Social networking has become a major part of lives these days. ‘Being online’ is what that is trending! We spend more time...
Delegates were left red-faced after connecting to an open Wi-Fi network set up to protest mass digital surveillance.
The Famous Syrian Hacker Dr.SHA6H known for his anti-Bashar Al Assad views has struck again. This time the hackers has hacked and defaced the official Ohio...
President Barack Obama intends to persuade Congress to increase the sentence for hackers, as well as widen the definition of what hacking...
A 'widespread' malicious advertising campaign that sent web browsers to immitation websites has been stopped by Google
The Los Angeles Police Department has ordered some Tasers with built-in cameras that can actually record if the Taser is used. This...
A website mimicking the official BBC News site has garnered immense traffic earlier this week through false information about Charley Hebdo massacre...
Countless American and United airlines’ User Accounts Stolen by Hackers – Dozens of free trips booked as hackers retrieve user ids and passwords...
The end of mainstream support for Windows: Don't repeat the mistakes of the past, and be prepared. Especially if you've only just...
The Swiss state owned Banque Cantonale de Geneve has confirmed that hackers have released confidential customer correspondences after the bank refused to...
Presenting a recorded webinar that seeks to answer this question: How is the landscape changing for cybersecurity and what do businesses need...
Since April 1994, when the first cable connected to China‘s Internet, the Beijing government strives to maintain control over online content accessed...
President Barack Obama is planning to push legislation which would protect companies from lawsuits for sharing cyberthreat data with the government, reports...
The rent-a-DDoS service that knocked out Xbox Live and Playstation Network is powered by thousands of hacked residential internet routers.
British Prime Minister David Cameron has stated his belief that encrypted messaging services must have backdoor access to government agencies
Twitter and YouTube accounts run by the US military's Central Command are hijacked by hackers claiming to back Islamic State.
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams