A hack shown off by Dutch security researchers allows an attacker to ‘take over’ Google’s new Glass headset, and send pictures and...
A flaw in PayPal’s two-factor authentication could allow attackers to gain access to up to 143 million PayPal accounts. The vulnerability affected...
On 26 June, the day of Armed Forces of Azerbaijan -, Azerbaijani hackers from Anti-Armenian Team hacked and defaced the official website of...
Google’s upcoming Android L update will do away with passwords - at least for dedicated Google fans, with Google devices such as...
/** * CVE-2014-4014 Linux Kernel Local Privilege Escalation PoC * * Vitaly Nikolenko * http://hashcrack.org * * Usage: ./poc [file_path] * *...
Personal information on 1.3 million people including bank details, medical records and home addresses may have leaked after a security incident where...
The Wi-Fi network name and password for the security center at the World Cup were accidentally leaked online by a newspaper, and...
Dozens of car washes across Connecticut have leaked “countless” credit and debit card details to cybercriminals, according to a new investigation by...
Google’s Nest thermostat can be hacked in under a minute, according to a blog post and video posted by GTV Hacker. The...
ESET LiveGrid® telemetry has indicated several new infection vectors used by Android/Simplocker. The “typical” ones revolve around internet porn, or popular games...
Usually we see cyber attacks, hacking and warnings from online hacktivists Anonymousbut a song? Well here’s what happened. Micheal Jackson’s famous hit...
Scammers and fraudsters think nothing of scraping the barrel of taste, if they believe it will help them earn a few dollars.
German Humanist Union, an independent civil liberties organization, has awarded Snowdenwith the Fritz Bauer Prize for exposing NSA’s controversial surveillance practices. The...
Amazingly, it was way back in 2011 that I came across my very first World Cup 2014 scam. Surely that merits a...
We know how drones are used for surveillance, target killings or in some cases to save human lives, but now a South African company...
Blackmailers force internet site Code Spaces out of business, leaving customers in the lurch.
The usual pattern we see when dealing with exploit kits starts with a legitimate website that gets compromised and used to automatically...
A California oil company that lost thousands after being attacked by hackers has won $350,000 in a legal settlement after suing its...
As the World Cup heads into its third week, there’s a new phishing scam to be aware of. EA Games’ FIFA 14...
ESET researchers recently came across a targeted attack against the Vietnamese government's Ministry of Natural Resources and Environment (MONRE).
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft