A hacker from online hacktivist group AnonGhost has hacked and defaced a total number of 1282 random websites just few hours ago. Hacker has...
A new white paper, titled Windows 8.1 Security – New and Improved, looks at the some of the most anticipated—and controversial—security features...
� The famous online hacktivist from Moroccan Ghosts have hacked and defaced the official website of�Israel Taekwondo Federation (ITF) in support of...
The famous online hacktivist from Moroccan Ghosts have hacked and defaced the official website of Israel Taekwondo Federation (ITF) in support of...
An emotional Google Search advertisement has become a massive hit in both India and Pakistan, talking about a reunion of two best...
If you think its just the National Security Agency (NSA) that pokes its nose in your privacy then you are wrong. American...
We have always heard about drones killing people in Afghanistan and Pakistan or most of the times used for surveillance purposes. But...
Jeremy Hammond, 28, was convicted of hacking Strategic Forecasting also known as Startfor Intelligence in December 2011. Chicago based Jeremy Hammond linked to...
A hacker going with the handle of OxAlien has hacked and breached into the database of Israeli based largest Apple and MAC related forum...
Microsoft has opened a new Cybercrime Center - a war room where the tech giant’s lawyers and security experts will use bleeding-edge...
Don't let cybercriminals spoil your holidays! Our tips will ensure you don't get fooled by the latest scams while you hunt down...
A Singaporean hacker James Raj, 35, part of online hacktivist group Anonymous has been charged with hacking into the government owned council website and posting...
Keypic uses an image - usually an advert, but it can be a single pixel, an animation, or anything the site’s administrator...
Half of the world's 50 biggest banks have faced security incidents affecting their web applications. Fifteen per cent of those incidents were...
Hackers have accessed full card details for at least 376,000 people in a cyberattack on a “reward scheme” company, Loyaltybuild - as...
Facebook users who used the same email and password on their Adobe and Facebook accounts have been offered a helping hand by...
We are well familiar with the NSA‘s spying over its own citizens and all over the globe but can the government go to a limit...
For all those folks who log into dating sites in order to ‘get a sexy lady’ and blindly trust whoever the found...
The Anonymous is on the warpath. This time, however, the battle is between the Indonesian and Australian division of the group. In a video posted this...
More vulnerabilities have been discovered in a D-Link router, leaving the device vulnerable to attacks via its web interface - only weeks...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks