Amazingly, it was way back in 2011 that I came across my very first World Cup 2014 scam. Surely that merits a...
We know how drones are used for surveillance, target killings or in some cases to save human lives, but now a South African company...
Blackmailers force internet site Code Spaces out of business, leaving customers in the lurch.
The usual pattern we see when dealing with exploit kits starts with a legitimate website that gets compromised and used to automatically...
A California oil company that lost thousands after being attacked by hackers has won $350,000 in a legal settlement after suing its...
As the World Cup heads into its third week, there’s a new phishing scam to be aware of. EA Games’ FIFA 14...
ESET researchers recently came across a targeted attack against the Vietnamese government's Ministry of Natural Resources and Environment (MONRE).
With the first half of the year almost over, it's time for the ESET 2014 Mid-Year Threat Review. Presented as a webinar,...
Ancestry.com has become the latest site to be taken down by a distributed denial-of-service (DDOS) attack. The genealogy website was shut down...
Nokia paid several million euros to criminals who threatened to reveal the source code for part of its smartphone operating system seven...
A hacker has reportedly harvested over $600,000 in digital currency, using a network of hijacked machines, in what is believed to be...
A dangerous new strain of malware has been discovered, able to steal banking credentials without alerting users to the interception.
Note-taking and archiving app Evernote has announced that its discussion forum has been hacked, compromising some users’ passwords, dates of birth and...
Anonymous has fulfilled its promise of conducting cyber attacks on the government of Brazil during the football World Cup. Anonymous has come up...
A group of hackers claim to have stolen the personal details of some 650,000 pizza lovers, and have threatened to release them...
Picture-sharing social media site Pinterest appears to have been hacked, as multiple users reported weight-loss spam messages both on Pinterest itself and...
A group of hackers going with the handle of Rex Mundi breached into the database of Domino�s Pizza websites in France and...
The top three teams from the fifth annual Mayors' Cyber Cup will attend Cyber Boot Camp at the headquarters of ESET North...
Graduation is a great time to review your social media profile. Don't let a wild and crazy social network presence undermine the...
Newly stolen credit and debit card details, from cards used in P F Chang’s China Bistro, a nationwide American chain of restaurants,...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks