Jeremy Hammond, 28, was convicted of hacking Strategic Forecasting also known as Startfor Intelligence in December 2011. Chicago based Jeremy Hammond linked to...
A hacker going with the handle of OxAlien has hacked and breached into the database of Israeli based largest Apple and MAC related forum...
Microsoft has opened a new Cybercrime Center - a war room where the tech giant’s lawyers and security experts will use bleeding-edge...
Don't let cybercriminals spoil your holidays! Our tips will ensure you don't get fooled by the latest scams while you hunt down...
A Singaporean hacker James Raj, 35, part of online hacktivist group Anonymous has been charged with hacking into the government owned council website and posting...
Keypic uses an image - usually an advert, but it can be a single pixel, an animation, or anything the site’s administrator...
Half of the world's 50 biggest banks have faced security incidents affecting their web applications. Fifteen per cent of those incidents were...
Hackers have accessed full card details for at least 376,000 people in a cyberattack on a “reward scheme” company, Loyaltybuild - as...
Facebook users who used the same email and password on their Adobe and Facebook accounts have been offered a helping hand by...
We are well familiar with the NSA‘s spying over its own citizens and all over the globe but can the government go to a limit...
For all those folks who log into dating sites in order to ‘get a sexy lady’ and blindly trust whoever the found...
The Anonymous is on the warpath. This time, however, the battle is between the Indonesian and Australian division of the group. In a video posted this...
More vulnerabilities have been discovered in a D-Link router, leaving the device vulnerable to attacks via its web interface - only weeks...
One of the largest cyber 'war games' ever created tested thousands of banking staff across London’s investment banks against the ‘worst case...
A coalition of digital rights organizations and academics recently published an ‘open letter’ to the Anti-Malware/Anti-Virus industry asking for clarification on vendor...
American PC users are being hit with a new wave of Filecoder ransomware, which locks access to computers and demands $300 -...
Brazilian authorities have accused Google of spying over their country’s streets. According to the authorities, Google since the launch of it’s street...
The hackers behind NASA hack from BMPoC hacking group have now hacked and defaced total 21 sub-domains of Brazilian Military. The domains...
The official website of Singapore Prime Minister Lee Hsien Loong (http://www.pmo.gov.sg/) was hacked and defaced by Anonymous Singapore after receiving a warning directly from PM’s...
A Pakistani hacker going with the handle of Gujjar (PCP) from Pak Cyber Pyrates had hacked and defaced the official website of Maharashtra...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft