Emerging photo messaging application Snapchat has been hacked, as a result unknown hackers have leaked and published personal information including usernames and phone...
The online hactivists Ayyildiz Team from Turkey has hacked and defaced the official website of United Nations Development Program (UNDP) designated for Republic of Ecuador....
While addressing a large number of hackers and computer experts at Chaos Communication Congress in Hamburg, the WikiLeaks founder Julian Assange urged hackers...
NSA involved in abusive surveillance and offensive cyber attacks, manipulating bank balances to achieve targets. Until now we only knew one side of...
On behalf of ‘’Team Hack Read’’, we would like to wish all our readers a very Happy New Year & Seasons Greetings....
Hacktivists going with the handles of Anonymous Tunisia and AnonGhost have taken down websites of 11 private Israeli banks in a DDoS attack....
Briton based BBC was hacked and its computer server was on sale this Christmas. A hacker took control of computer servers at...
A phishing scam targeting Tesco bank customers puts on a festive party hat and pretends to offer something for nothing. Is this...
Critical vulnerability in Samsung Galaxy S4 allows hacker to install a malicious code, track emails and record sensitive communication data. An Israeli...
Syrian Hacker Hacks Mali and El Salvador United Nations Population Fund against Syrian Conflict. A Syrian hacker going with the handle of Dr.SHA6H...
A federal judge has said in his ruling that spying and collecting personal information of American citizens is completely legal and a ”counter-punch”...
NSA‘s whistle blower Edward Snowden has a special message for you on this Christmas. We thank Mr. Snowden for his contribution in...
The NSA’s whistle blower Edward Snowden has said that ‘’he has already won, he has achieved what he dreamed of ’’ especially...
Here, J.R. Rao, IBM Director for Security Research, explains why the idea of a digital guardian who watches for unusual behavior is...
An online poker site which did all its cash-ins and cash-outs in Bitcoin has admitted to a data breach in which 42,000...
Tips for shoppers worried that their credit or debit cards may have been compromised by the massive security breach at Target stores.
Details of 40 million customer debit and credit cards may have leaked in a data breach at American retailer Target - which...
This holiday season, shoppers are turning to mobile as a new way to hunt bargains, with purchases via mobile platforms nearly doubling...
Despite Snowden’s voluntarily offer to help Brazil in investigating National Security Agency’s (NSA) spying activities against the country, the land of beauty...
Death of a Sales Force: Whatever Happened to Anti-Virus? is a paper written by Larry Bridwell and myself for the 16th AVAR...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage