An Iranian hacker going with the handle of Dr.3v1l from Black_Devils B0ys hacking group has breached to an Israeli based job search portal, as...
From legitimate companies delivering software with a “side-order” of malware, to PC attacks that persuade you to infect your own phone, here...
Most smartphones today contain an accelerometer - without them, the latest fitness apps don’t work - but a Stanford researchers has shown...
If you live in New York or San Francisco, you will know the importance of its billboards and strange messages mentioned on...
Some models of the popular routers made by D-Link contain a “backdoor” which could allow a remote attacker access to settings and...
The Moroccan based online hacktivist going with the handle of AnonGhost has hacked and defaced 65 Israeli websites under the banner of...
A Pakistani hacker going with the handle of Ch3rn0by1 from P4K-M4D-HUNT3R-Z has hacked and defaced the official domain of India’s Bharat Sanchar Nigam Limited (BSNL) Telecom yesterday....
In a high profile hack, a famous Pakistani hacker going with the handle of H4x0r HuSsY from MadLeets hacking crew has...
The world renowned BMPoC hacker who got fame by defacing 14 official NASA domains against NSA’s spying over Brazil and Syrian war has now defaced...
The online hacktivists from Anonymous Palestine – KDMS Team has hacked and defaced the official websites of anti-virus giant ESET, BitFinder along with...
In this blog post, we will describe software detected by ESET products as Win32/Kankan, and explain why its discovery shocked many Chinese...
A trio of men plugged keyloggers disguised as ordinary connectors into cash registers in a Nordstrom department store in Florida, and returned...
For many PC users USB keys must seem like a relic of a bygone age - but for security-conscious workers, keys can...
Tiny things such as using an admin account on your PC when you don’t need to can give cybercriminals their “way in”....
Smartphone users want more protection for the data on their cellphone - and are perfectly comfortable being fingerprinted if that’s the best...
The newly formed Intellectual Property Crime Unit of the City of London Police (IPCU) is in action. In its first operation the...
Famous Syrian Hacker Dr.SHA6H has hacked and defaced the official website of U.S. City of Mansfield, OH earlier today in support of a...
Cyber attacks against Industrial Control Systems pose a risk to power plants and other critical infrastructure - and action is needed to...
The costs of cybercrime have continued to rise for victims, for the fourth consecutive year, according to a survey conducted by the...
The official domains of Alexa internet search have been hacked and defaced by Anonymous Palestine affiliated group KDMS Team. KDMS hackers left...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft