The official websites of World Wildlife Fund (WWF) and Earth Hour Philippines have been hacked and defaced by Indonesian based hacking group Gantengers Crew. Hackers...
Researchers have demonstrated an attack that completely bypasses the protections offered by EMET - a Microsoft toolkit used to provide safeguards against...
Samsung has introduced fingerprint-scanning security as standard into its new flagship Galaxy S5 handset - with Finger Scanner offering secure shopping via...
There are lots of ways that hackers can steal your passwords, and use them against you. So what can you do to...
Screenshot of the deface page left by the hackers EC- Council Website of the Security Certification Group got defaced with passport of...
A large majority of routers used in small offices are plagued with security vulnerabilities - with up to 80% of small office/home...
Hackers who stole hundreds of thousands of card details from upscale retailer Neiman Marcus set off more than 60,000 security alerts -...
In order to demolish North Korean nuclear facilities, South Korea has decided to develop its own cyber attack tools. Stuxnet kind of weapons have...
In this blog post, we provide an in-depth analysis of Linux/Ebury - the most sophisticated Linux backdoor ever seen by our researchers....
More than 300,000 records of faculty, staff, students, and affiliates of the Maryland University were breached, according to the University’s president. In...
It's not just fake tech support: call centre cold-callers are operating various kinds of insurance scams, too.
Smartphone dating app Tinder revealed more about its users than they might have wished over a period of several months last year...
Did you know that medical data on 20,000 people may be exposed to abuse today? As a healthcare practitioner, you may not...
The increasing use of QR codes as a way to add interactive elements, apps and websites to display advertising, competitions or print...
Syrian Electronic Army, the pro- Bashar Al Assad Syrian hackers, hacked the official twitter accounts of Futbol Club Barcelona (FC Barcelona) and sent...
Belkin’s WeMo home automation systems contain multiple vulnerabilities which could allow attackers to remotely control devices attached to a WeMo system -...
The online hacktivists from Z Company Hacking Crew (ZHC) have hacked two official domains of National portal of India and left messages against Indian...
In 2012, we reported that US NAVY faces 110,000 cyber attacks every hour. Now a report has gone viral that Iran’s penetration into...
An emotional appeal posted on the dark market’s official forum clearly stated that “We have been hacked” and nearly $2.4 to $2.7...
Google has bought a company offering a new form of two-factor authentication - using “silent” sounds played via PC and smartphone speakers...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks