Amazingly, it was way back in 2011 that I came across my very first World Cup 2014 scam. Surely that merits a...
We know how drones are used for surveillance, target killings or in some cases to save human lives, but now a South African company...
Blackmailers force internet site Code Spaces out of business, leaving customers in the lurch.
The usual pattern we see when dealing with exploit kits starts with a legitimate website that gets compromised and used to automatically...
A California oil company that lost thousands after being attacked by hackers has won $350,000 in a legal settlement after suing its...
As the World Cup heads into its third week, there’s a new phishing scam to be aware of. EA Games’ FIFA 14...
ESET researchers recently came across a targeted attack against the Vietnamese government's Ministry of Natural Resources and Environment (MONRE).
With the first half of the year almost over, it's time for the ESET 2014 Mid-Year Threat Review. Presented as a webinar,...
Ancestry.com has become the latest site to be taken down by a distributed denial-of-service (DDOS) attack. The genealogy website was shut down...
Nokia paid several million euros to criminals who threatened to reveal the source code for part of its smartphone operating system seven...
A hacker has reportedly harvested over $600,000 in digital currency, using a network of hijacked machines, in what is believed to be...
A dangerous new strain of malware has been discovered, able to steal banking credentials without alerting users to the interception.
Note-taking and archiving app Evernote has announced that its discussion forum has been hacked, compromising some users’ passwords, dates of birth and...
Anonymous has fulfilled its promise of conducting cyber attacks on the government of Brazil during the football World Cup. Anonymous has come up...
A group of hackers claim to have stolen the personal details of some 650,000 pizza lovers, and have threatened to release them...
Picture-sharing social media site Pinterest appears to have been hacked, as multiple users reported weight-loss spam messages both on Pinterest itself and...
A group of hackers going with the handle of Rex Mundi breached into the database of Domino�s Pizza websites in France and...
The top three teams from the fifth annual Mayors' Cyber Cup will attend Cyber Boot Camp at the headquarters of ESET North...
Graduation is a great time to review your social media profile. Don't let a wild and crazy social network presence undermine the...
Newly stolen credit and debit card details, from cards used in P F Chang’s China Bistro, a nationwide American chain of restaurants,...
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
Compromising Cryptographic Key Security Through PuTTY: A Deep Dive into CVE-2024-31497
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
FTC Fines Mental Health Startup Cerebral $7 Million for Major Privacy Violations
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks
Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files