One of the largest cyber 'war games' ever created tested thousands of banking staff across London’s investment banks against the ‘worst case...
A coalition of digital rights organizations and academics recently published an ‘open letter’ to the Anti-Malware/Anti-Virus industry asking for clarification on vendor...
American PC users are being hit with a new wave of Filecoder ransomware, which locks access to computers and demands $300 -...
Brazilian authorities have accused Google of spying over their country’s streets. According to the authorities, Google since the launch of it’s street...
The hackers behind NASA hack from BMPoC hacking group have now hacked and defaced total 21 sub-domains of Brazilian Military. The domains...
The official website of Singapore Prime Minister Lee Hsien Loong (http://www.pmo.gov.sg/) was hacked and defaced by Anonymous Singapore after receiving a warning directly from PM’s...
A Pakistani hacker going with the handle of Gujjar (PCP) from Pak Cyber Pyrates had hacked and defaced the official website of Maharashtra...
The official website of Palestinian Broadcasting Corporation (PBS) has been hacked and defaced by a hacker going with the handle of gOx....
The pro-Syrian President hackers from Syrian Electronic Army has hacked the official website of Vice Magazine (vice.com) for publishing article, revealing the identities...
A cyberheist targeting a bitcoin "bank" website has netted thieves more than 4,100 bitcoins, worth $1.2 million. The hack is among the...
The system relies on users describing patterns of blots, then matching descriptions to patterns - and should be foil the automated programs...
Domestic violence is not something that gets discussed much in information security circles, but there are few people that need advice on...
Only weeks after the closure of Silk Road, a “drug market” which authorities claim shipped $1.2 billion of drugs including heroin around...
The FBI added five new cybercriminals to its Most Wanted list - including a new entry at number one, Alexsey Belan. The...
On November 2nd, 1988, the Morris worm was released by its author, and within 24 hours had caused damage across the world....
A new app lets you unlock Mac computers without entering a password - users simply tap on a paired iPhone with the...
Adobe’s security breach laid bare 38 million passwords to the world - and a security researcher claims that 1.9 million of these...
Tom Hanks and Donald Trump are among a client list of 850,000 users of limousines and town cars to become the latest...
Google may soon offer Chrome users a little extra protection for their passwords - which could previously be accessed in “one click”...
A three-year-battle with a mysterious new strain of malware has led researcher Dragos Ruiu to conclude that the BadBIOS malware infesting his...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks