As I had reported earlier how Bangladesh Black HAT Hackers (BBHH) have started cyber war against Indian cyber space by hacking 90 Indian...
Last week the FBI had arrested an alleged hacker who they claim is a member of online hacktivist Anonymous group and took...
Brazilian President Dilma Rousseff has decided to cancel her visit to the U.S. scheduled for October 23 against the NSA’s spying over...
A hacked card reader - similar to the ones used in shops and restaurants - is on sale on Russian forums for...
“Hardware Trojans” could be baked invisibly into circuits by attackers, allowing them to grab secret keys from computer components without fear of...
Nina Davuluri is a 24 year old Indian descent born in Syracuse, New. The first woman of Indian descent to be crowned...
The official website of Pakistan International Airlines (PIA) () has been hacked and defaced by a Pakistani hacker going with the handle...
A Sudanese hacker going with the handle of Al Max Hacker has hacked a high profile official website of V. O. Chidambaram...
With malicious remote access attacks of the rise it is time to check your computer's RDP configuration and apply restrictions, like turning...
A brainwave scanner could be used as the ultimate biometric “car key” according to researchers at Tottori University - and even prevent...
Six Nigerian men have gone on trial today in London for an alleged phishing scam where job offers at London’s exclusive Harrods...
A Bangladeshi hacker going with the handle of ExpirED BraiN from 3xp1r3 Cyber Army has hacked and defaced 30 pornography websites, deleting...
A group of twelve hackers have been arrested by the police for hacking into the computers of Santander bank branch in London...
An unknown hacker has hacked the official Facebook page of Iranian Foreign Ministry with over 2 million fans against police brutality on...
A group of Bangladeshi hackers going with the handle of Bangladesh Black HAT Hackers (BBHH) have hacked and defaced 60 Indian websites,...
Turkish hackers from Turk Hack Team going with the handle of Black-Spy and WhooLe have hacked and defaced total 750 random websites...
A new variant on a family of Mac OS X malware which targets Tibetan activists has been found in the wild and...
A sub-domain which belongs to the official website of City of Durham, North Carolina U.S has been hacked and defaced by a...
A profile Syrian hacker going with the handle of Dr.SHA6H has hacked the official website of German based Avira antivirus software company designated...
A breach which has leaked personal data for two million Vodafone Germany customers has ben claimed to be the work of an...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft