Apps with a hidden “dark side” could sneak past Apple’s approval process, according to researchers at Georgia Tech. The researchers proved this...
In two different cyber attacks by two different hackers have targeted Bangladeshi government websites, as a result the official websites of Ministry of...
A palestanian security research has exposed one of the vulnerability facebook was carrying through. The researcher who calls himself Khalil reported that...
During recent times, social media has by some distance defeated ordinary ways of trading. This has indeed directed many people towards social...
The online hackavist group Anonymous has hacked and defaced the official website of Gabon’s top most manganese alloy producer (http://www.eramet-comilog.com) for their ongoing operation...
Youtube, world’s leading video sharing site has been hit by two programmes which are found to be placing ads into the site...
The Syrian Electronic Army has done it again this time Washington Post, Time and CNN have been targeted by Syrian hackers by...
A Pakistani hacker going with the handle of Dr@cula has hacked and defaced 6000 Indian websites including the official website of Consulate General...
Well known Indonesian hacker going with the handle of SultanHaikal has hacked and defaced the official website of Mazda motors club (http://www.mazdaclub.co.il) designated for Israel...
Most of us have faced cyber attacks sent by our best friends - Facebook "offers" they've clicked by accident, spamming everyone on...
A Texas family were horrified by an apparent hacker attack in which a criminal was able to spy on their two-year-old daughter...
OxAlien, known for his high profile Virgin Radio Dubai hack is back in news by breaching into an Iranian based cyber crime...
Turkish hackers from Turk Hack Team have hacked and defaced more than 1600 websites against alleged killings of Uyghur Muslims in China. All sites...
A Pakistani hacker going with the handle of H4x0r HuSsY has hacked and defaced 650+ Israeli websites on the eve of Pakistan’s independence...
An infographic of recent healthcare IT security statistics paints a striking picture of much security work yet to be done, even as...
Two video plug-ins for YouTube hijack users visits to the site and insert extra adverts - some of which are being hijacked...
Philips Hue lighting system is vulnerable to attacks which can cause a “perpetual blackout” in the homes of users, according to a...
In reply to Indian hackers for hacking Pakistan Army website, a hacker going with the handle of MindCracker from Pakistan Cyber Army has...
Cybercriminals will unleash a wave of “zero-day” vulnerabilities to attack Windows XP machines after April 8, 2014, a security expert has claimed.
A security flaw has left all Android Bitcoin wallets vulnerable to theft, Bitcoin.org has warned. The vulnerability affects all Bitcoin wallets on...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment