Grand Theft Auto V sold more than $1 billion worth of units in a week - no wonder cybercriminals are tempted to...
Indonesia as a major source of malicious traffic? That's what a recent infographic from content delivery network provider Akamai seemed to say....
An Indonesian Hacker known with the handle of Dbuzz has hacked and defaced the official sub-domain of U.S. Department of State (http://ourplanet.infocentral.state.gov). Defaced domain...
Middle aged PC users routinely ignore warnings that sites may harm their computers - and that figure has doubled since 2011, according...
In an extremely high profile hack, An Indonesian hacker going with the handle of Dbuzz has hacked and defaced the official blog...
A huge amount of private information harvested via hotel Wi-Fi networks is on sale in China - including phone numbers, dates of...
November 5 will be a day when people from around the world will gather to march and protest for several causes. World’s most...
Children indulge in highly risky behavior online - with nearly one in five 9-11 year olds having physically met strangers they encountered...
Cyber attacks have doubled in the year 2012-2013, according to a fraud report released by investigators Kroll - and the target is...
Newly emerging Pakistan based hacking group TeaM MADLEETS has done a high profile defacement in which the official forum of world renowned UK...
The hackers from Syrian Electronic Army known for their hardcore support for Syrian President Bashar Ul Assad are back in news with...
A group of Azerbaijani hackers from Azerbaijan Hacker Team has hacked several Armenian websites including the website of Armenian National Security Service....
A couple in Shanghai city of China is facing criminal charges for selling their infant daughter on an online forum in order...
The detection and blocking of malicious code employed by modern threats, whether targeted attacks or mass-spreading campaigns, has been a game of...
Iran is now the world’s fourth biggest cyber army, claims an official of the Islamic Revolution Guards Corps stressing that the IRGC’s...
Cybercriminals are already targeting mobile banking apps as a “way in” to customer accounts – as witnessed in ESET’s discovery of a...
The global press release distribution firm PR Newswire has admitted to a large-scale breach, in which usernames and passwords were stolen -...
A famous Algerian hacker Over-X has hacked into the server of world renowned Red Bull energy drink, as a result company’s blog and...
On average, Windows PC users spend five days a year waiting for their machines to load - and the culprit for slow...
Security researchers from Autodesk, along with Microsoft, announced new features in AutoCAD to prevent malware in a presentation at Virus Bulletin 2013...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks