One in five adults has fallen victim to hacks targeting their email accounts, social networking accounts or online bank accounts, according to...
The online hackavists from Anonymous group are taking #OpGabon to a new level as they have hacked and defaced the official website...
WikiLeaks has released 84,067 highly sensitive email conversations between agents of US intelligence contractor Stratfor. The release was announced by WikiLeaks on its official website according...
FBI claims victory over the Anonymous group, this statement has come after a series of arrests from the anonymous group. According to...
Online hackavist Phr0zenMyst who is known for his high profile is back with another hack. This time the hacker has breached into...
Newly emerging Pakistani based MadLeets hacking group has been making news for a while now, this time a hacker going with the...
An organization ran by Azerbaijani hackers known as ANTI-ARMENIA.ORG has hacked and defaced high profile Armenian government ministries websites earlier today. The...
A group of Pakistani hackers going with the handle of MadLeets have hacked and defaced a Pakistani based online telecom and IT news...
Children come into contact with the internet at a very young age these days - a survey on a parenting site this...
Two days ago on August 21, 2013, online content sharing site ShareThis.com reveals that its website has been facing some sort of...
In a collective cyber attack conducted by Turkish hackers from Turkish Ajan hacker group the official websites of world renowned fast food chain Pizza Hut designated...
A Pakistani hacker going with the handle of H4x0r HuSsY from Pakistani Leets hacking group has hacked and defaced total 250 Israeli websites in...
Millions of dollars have been lost to an "ominous" new hi-tech tactic used by cybercriminals - where a low-powered DDoS attack is...
The popular online “battle arena” game League of Legends has suffered a major security breach which exposed account information for North American...
Orbit Downloader by Innoshock is a popular browser add-on often used to download embedded videos from sites such as YouTube. But the...
Academics create new “anti-phishing” technology - electronic identity cards which allow secure access to websites, and which could simplify access for people...
In this blog post we confirm that the Avatar rootkit continues to thrive in the wild, and disclose some new information about...
A hacker claims to have access to “the entire database of users on Twitter”, warning that “no account is safe”. He has...
Personal information for 14,000 U.S. Department of Energy employees has leaked in a data breach, according to the Wall Street Journal. It's...
The bug allowed attackers to see any passwords using in a recent browsing session by performing a “memory dump”, and would have...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment