Since Senator. Al- Franken has become of part of the United States Senate, he has been the Chairman of Senate Judiciary Subcommittee...
There is a new bot on the block. ESET identifies it as Win32/Napolar while its author calls it solarbot. This piece of...
Yahoo! recently began recycling “inactive” user accounts, in an effort to woo new customers - but some customers who have acquired these...
Yesterday I updated you with NYPD’s activity where it was found running a campaign, asking users to upgrade their iPhone and iPads to...
Among the list of those countries which are considered a top target by the NSA‘s surveillance program, India has been up there...
Many workplaces allow wokers to bring their own smartphones, tablets and PCs to work - a practise described as "Bring Your Own...
Android users will now be able to remotely add a password to a lost device, even if it's locked, or already being...
We think that there could be rootkits targeting the OS X platform, but we have very limited visibility into that threat right...
Germany's Chaos Computer Club released a video showing how a "fake fingerprint" made from latex could be used to fool the sensor,...
The New York Police Department has issued a statement in which users have been asked to update their iPad and iPhone devices...
A Jordanian hacker going with the handle of Evil-Jo has hacked and defaced the official website of Palestine Ministry of Justice yesterday...
One lucky hammer group had already nailed the fingerprint sensor of iPhone 5S. The phone will finally hit the sales floor on...
A Pakistani hacktivist group going with the handle of Team Madleets have hacked and defaced five (5) official Google domains designated for Republic of...
Android gamers have been warned to be wary of Grand Theft Auto V’s official “partner” app – Grand Theft Auto iFruit –...
Famous Indian hacker going with the handle of Yamraaj has hacked and defaced one of the official website of Bangladeshi Prime Minister...
The online hacktavist AnonGhost has hacked and defaced 75 Israeli websites from 15th to 19th September. AnonGhost left a deface page along...
Cybercriminals are switching tactics, a leading security body has warned - and the combination of anonymisation technologies, mobile devices, and social media...
A stealthy banking Trojan known as Caphaw or Shylock has resurfaced - and is attacking customers of 24 American banks. It's armed...
This is a quick reminder that the September 23 deadline for compliance with the new HIPAA regulations is rapidly approaching. Organizations that...
Pakistani hacktavists from MaDleets TeaM have defaced the official websites of Pakistan Military Engineer Services (mes.gov.pk), Pakistan Bar Council (pakistanbarcouncil.org) and Secretariat...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage