The well known Turkish hackers from Turkish Ajan hacking group have hacked into the official website of Sony Electronics (web.sony.it) designated for...
Microsoft has collaborated extensively with the intelligence services of the United States to allow users’ communications details. The company even helped the...
Cyber risk has shot up in importance for company CEOs and senior executives, according to an Ipsos survey for Lloyds Risk Index...
A Kremlin security agency has ordered $15,000 of electric typewriters - sparking international gossip about a return to “old school” security measures.
The Russian newspaper “Izvestia” reported on Thursday that the Federal Protective Service of the country bought 20 typewriters to prevent sensitive information...
A group of hackers claiming to have roots in Afghanistan going with the handle of Afghan Cyber Army has hacked and defaced six...
Governments around the world are recruiting “cyber-mercenaries” - groups of skilled cyber professionals who target institutions such as banks and energy companies,...
“Bug bounties” paid out for finding and reporting bugs and vulnerabilities are a cheap and effective way for companies to bolster their...
A U.S. Government department threw away IT components including printers, computer mice and keyboards in an effort to root out a “sophisticated”...
My colleagues at ESET Ireland, report that an all-too-familiar scam is currently hitting Irish mailboxes. I’ve talked about it at some length...
I made a comment recently that was subsequently quoted in a recent ESET blog – Android “master key” leaves 900 million devices...
The threat of cyber attack loomed over the opening ceremony for the London Olympics last year, officials have revealed.
A sustained brute force cyber attack battered Nintendo’s defences for a month this summer - and allowed cybercriminals access to private data...
An Anonymous hacker going with the handle of Anonymous Jordan has hacked and defaced eight (8) Egyptian Ministry websites against the taking down...
Investment research firm Morningstar says that personal information including credit card numbers for clients, email addresses and passwords may have been compromised...
The online hackavist from Anonymous group has targeted the Hawthorne Police department in response to police shooting a man’s rottweiler dog. As reported by...
Just a few days after the reports on vulnerability in the android devices, more shocking news are disclosed. Now, it is believed...
Android phones have now become a source of income for the cyber criminals. The cyber criminals have began a new type of...
Just breaking now that Edward Snowden the man behind leaking NSA’s secret documents and exposing PRISM project has been offered asylum by the Republic...
When it comes to malwares, often it is android which are most affected. Often in headlines we find some malware found in...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage