Apple has announced an event for October 22, with the usual teasing headline, “We still have a lot to cover.” Leaked pictures...
The official Twitter account of Israeli Prime Minister Benjamin Netanyahu was found following an Iranian porn Twitter account before unsubscribing Sunday morning, about seven...
The online hacktivists from Anonymous group has started an new operation under the banner of OpMaryville. The operation is planned when authorities at Maryville set...
Bringing the international gang lords of cybercrime to justice is a “challenge”, the interim head of Britain’s new National Cyber Crime Unit...
An Iranian hacker going with the handle of Dr.3v1l from Black_Devils B0ys hacking group has breached to an Israeli based job search portal, as...
From legitimate companies delivering software with a “side-order” of malware, to PC attacks that persuade you to infect your own phone, here...
Most smartphones today contain an accelerometer - without them, the latest fitness apps don’t work - but a Stanford researchers has shown...
If you live in New York or San Francisco, you will know the importance of its billboards and strange messages mentioned on...
Some models of the popular routers made by D-Link contain a “backdoor” which could allow a remote attacker access to settings and...
The Moroccan based online hacktivist going with the handle of AnonGhost has hacked and defaced 65 Israeli websites under the banner of...
A Pakistani hacker going with the handle of Ch3rn0by1 from P4K-M4D-HUNT3R-Z has hacked and defaced the official domain of India’s Bharat Sanchar Nigam Limited (BSNL) Telecom yesterday....
In a high profile hack, a famous Pakistani hacker going with the handle of H4x0r HuSsY from MadLeets hacking crew has...
The world renowned BMPoC hacker who got fame by defacing 14 official NASA domains against NSA’s spying over Brazil and Syrian war has now defaced...
The online hacktivists from Anonymous Palestine – KDMS Team has hacked and defaced the official websites of anti-virus giant ESET, BitFinder along with...
In this blog post, we will describe software detected by ESET products as Win32/Kankan, and explain why its discovery shocked many Chinese...
A trio of men plugged keyloggers disguised as ordinary connectors into cash registers in a Nordstrom department store in Florida, and returned...
For many PC users USB keys must seem like a relic of a bygone age - but for security-conscious workers, keys can...
Tiny things such as using an admin account on your PC when you don’t need to can give cybercriminals their “way in”....
Smartphone users want more protection for the data on their cellphone - and are perfectly comfortable being fingerprinted if that’s the best...
The newly formed Intellectual Property Crime Unit of the City of London Police (IPCU) is in action. In its first operation the...
Are Your SaaS Backups as Secure as Your Production Data?
MS Exchange Server Flaws Exploited to Deploy Keylogger in Targeted Attacks
SolarMarker Malware Evolves to Resist Takedown Attempts with Multi-Tiered Infrastructure
“Linguistic Lumberjack” Vulnerability Discovered in Popular Logging Utility Fluent Bit
Foxit PDF Reader Flaw Exploited by Hackers to Deliver Diverse Malware Arsenal
Defending Your Commits From Known CVEs With GitGuardian SCA And Git Hooks
Cyber Criminals Exploit GitHub and FileZilla to Deliver Malware Cocktail
Latrodectus Malware Loader Emerges as IcedID’s Successor in Phishing Campaigns
Grandoreiro Banking Trojan Resurfaces, Targeting Over 1,500 Banks Worldwide
Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking
China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT
Kimsuky APT Deploying Linux Backdoor Gomir in South Korean Cyber Attacks
New Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacks
North Korean Hackers Exploit Facebook Messenger in Targeted Malware Campaign
Cybercriminals Exploiting Microsoft’s Quick Assist Feature in Ransomware Attacks
Google Patches Yet Another Actively Exploited Chrome Zero-Day Vulnerability
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Android 15 Rolls Out Advanced Features to Protect Users from Scams and Malicious Apps
Turla Group Deploys LunarWeb and LunarMail Backdoors in Diplomatic Missions
(Cyber) Risk = Probability of Occurrence x Damage