A new secret batch has been published by guardian which shows how NSA and FISA court documents with details regarding how the...
An investigation by a British talk radio station has shone light on the hackers who spy on young girls via webcams on...
CapoO_TunisiAnoO hacker from Tunisia who doesn’t require any introduction has hacked and defaced 87 Israeli websites three days ago. As usual all...
A group of Brazilian hackers from HighTech Brazil HackTeam has hacked and defaced the official website of Americana municipality of São Paulo, Brazil (www.americana.sp.gov.br) along...
Cyber crimes were once used to bully people online but as the time is passing, these criminals are enhancing their hacking skills....
Facebook is now allowing its million of users all around the world to post photo images to their comment box, where you...
Unknown hackers have hacked and defaced the website of FIFA World Cup in Brazil (http://copaemcuiaba.com.br) with a Youtube video, urging people not to come to...
Guccifer hacker who is known for his high profile hacking again politicians and celebrities has now hacked the email and Facebook account...
Abu Dahbi backed Manchester city, one of the oldest clubs of English premier League raises fears of possible hacking attempt to their database....
CBS News has revealed that one of their investigative reporter had her computer hacked and remotely accessed by an unknown hackers late last...
Apple has released a customer-privacy statement on Monday about Internet surveillance and PRISM program that it received between 4,000 and 5,000 requests from U.S....
The online hackavist group Anonymous Brazil has hacked the official Twitter account of one of Brazil’s largest magazine @VEJA, asking the Brazilians...
A recently published report in USA has outlined the route it takes for PRISM to get hold of the data from different...
ESET researchers explain the difficulties in attribution of targeted attacks; evidence is often circumstantial and the source never positively identified.
Many companies are unprepared for data breaches and hacking incidents - and the percentage of companies without any form of crisis response...
Yahoo defended its plan to recycle inactive user IDs this week, saying that it had put in place safeguards to prevent the...
While scrolling Zone-h, I got hold of a hack where a group of Kurdish hacker going with the handle of ColdHackers has...
An Indonesian hacker going with the handle of Surabayag3tar has hacked and defaced the official website of Bangladesh National Commission for UNESCO ()under the...
A simulated cyber attack with the Hollywood-esque title Quantum Dawn 2 will bombard the defenses of American banks on June 28 -...
The British government has launched the first stage of a £4 million ($6.1 million) campaign to educate consumers and small businesses about...
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
When is One Vulnerability Scanner Not Enough?
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
How to Make Your Employees Your First Line of Cyber Defense
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan