It so happens that I live over 5,000 miles from the ESET North America office in San Diego, and so tend not...
A group of Indonesian and Malaysian hacker going with the handle of Code-Newbie has hacked and defaced 44 Chinese government sub-domains belonging to Fifth...
Thursday: An Indonesian hacker going with the handle of ./BCT_48 has claimed responsibility for taking down the official website of Australian Federal Police and Reserve Bank amid an...
The company, E-Sports Entertainment, served up malware which used PCs to mine Bitcoins, an attack which earned $3,602. The malware was delivered...
The online hacktivist group Anonymous has released a video, according to which the group has declared global cyber war on the government of United...
The official website of All India Radio Allahabad has been hacked and defaced by Pakistani Hacker going with the handle of BLACK H3ART. Hacker has...
Dating site Cupid Media left personal details and plain text passwords for 42 million users exposed after an attack earlier this year....
In the first of a series of guest blog posts AV industry veteran Graham Cluley voices his opinion on how security has...
When any computer user types on a keyboard, the pattern of keystrokes is unique - like a fingerprint. When using a mouse,...
By the middle of May, users around the world started to receive messages from their contacts through different instant-messaging applications, such as...
A hacker going with the handle of Albaze Ever from Bangladesh Grey Hat Hackers has hacked and defaced the official website of Syrian Arab Republic’s...
The online hacktivists from Lulz Security Peru have hacked and defaced the official website of Peruvian President and Peruvian National Police. The website of Peruvian President...
Kevin Barrera was murdered at age 14 in 2009 in Richmond, California. In 2013, however, his death took on new proportions after...
CME, described by Bloomberg as the world’s largest futures trader, said in a statement that “to date” there was no evidence that...
Embattled handset maker BlackBerry has faced another blow, after the company warned users of a security bug affecting the software used to...
A hacker going with the handle of /Nullroot has hacked and defaced the official website of Franklin County, Ohio State on 17th Nov,...
“Pinkie Pie”, an under-21 hacker won $50,000 at the Pwn2Own contest, as he used drive-by attacks to take over a Samsung Galaxy...
Tens of millions of computer users are at risk from Filecoder due to a “mass spamming event”, detailed in an alert from...
A newly emerging hacking group going with the handle of M4ST£R 1T4L!4N H@CK£RS T£4M (Master Italian Hackers Team) has hacked and defaced...
The official website of State of Illinois’ Hillside Police Department has been hacked and defaced by online hactivist group AnonGhost. Hillside Police Department...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks