I am breaking this news for you that operating system Ubuntu has got its forum hacked as a result of a breach...
Famous Turkish hackers from Turk Hack Team is back with another hack, this time one of their hacker going with the handle...
A well known Pakistani hacker Sizzling Soul from Pak Cyber Eaglez is back in news with his latest attack in which 473 British based...
Three Saudi hackers going with the handles of SNipEr AL BaHa, CrAzY HaCkEr and SNIPER MAKKA have collectively hacked and defaced the official...
A Pakistani hacker going with the handle of MadcodE Haxor has hacked and defaced the official website of Pakistan based famous entertainment TV...
New “ransomware” attempts to terrify users into paying up by using the name of Britain’s SOCA crime unit - the Serious Organized...
The Police in Dubai have arrested an Indian national for filming and uploading a video on YouTube of a senior government official...
Anonymous hackers have claimed to breached the official website of US congress and its mail server (mail.house.gov and senate.gov), as a result around...
A group of Anonymous hacker has said to hack into a server used by Federal Emergency Management. According to them, the data...
“Children are a formidable adversary - unlike any other,” says Microsoft security researcher Stuart Schechter, in a paper to be presented at...
More than half of securities exchanges around the world faced cyber attacks last year, according to a paper released by the International...
Government agencies in India are now allowed to access your blackberry devices directly, allowing them to track conversations, emails and attachments sent...
Syrian hackers known for their hardcore support for President Bashar Ul Assad from Syrian Electronic Army are back in news, this time...
There are a few tricks to making passwords that will at least slow down cybercriminals - buying you time to reset your...
Micro-blogging site Tumblr has warned users that passwords can be “sniffed” from its iPhone and iPad apps - and issued a “very...
A Texas restaurant chain is suing one of its suppliers over a point-of-sale system which allowed hackers to steal customer data -...
A $250 signal-boosting device for cellphone users can be hacked, two researchers claim - offering total access to phone calls, internet use...
Browser security warnings can work to protect users from phishing and malware sites - but “warning fatigue” means important alerts over site...
A new biometrics system could “read” blood vessels under the skin using thermal imaging cameras - a system which its inventors claim...
LulzSecPeru known as one of the most skilled online hackavists are back, this time by the hackers have hacked and defaced the...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage