Many companies are unprepared for data breaches and hacking incidents - and the percentage of companies without any form of crisis response...
Yahoo defended its plan to recycle inactive user IDs this week, saying that it had put in place safeguards to prevent the...
While scrolling Zone-h, I got hold of a hack where a group of Kurdish hacker going with the handle of ColdHackers has...
An Indonesian hacker going with the handle of Surabayag3tar has hacked and defaced the official website of Bangladesh National Commission for UNESCO ()under the...
A simulated cyber attack with the Hollywood-esque title Quantum Dawn 2 will bombard the defenses of American banks on June 28 -...
The British government has launched the first stage of a £4 million ($6.1 million) campaign to educate consumers and small businesses about...
Hackers could remotely attack security cameras commonly used in banks and prisons - and either spy on secure facilities or replace “real”...
Microsoft has said that it has “liberated” two million PCs worldwide from Citadel botnets after an action on June 5 which targeted...
According to the recently leaked document from NSA by the Guardian, the U.S government is spying each and every conversation done by...
A hacker going with the handle of X-Blackerz Inc, supporting Anonymous hackavists on #OpIsrael has hacked into the server of an Israeli based hosting...
Cyber attacks are damaging the world economy, a former White House official has warned, and leading economies need to put aside political...
An Anonymous hacker going with the handle of @ItsKahuna on Twitter from Ohio is all set to confess the cyber crime for which...
Medical devices including heart defibrillators, patient monitors and anaesthesia devices include a dangerous password vulnerability which could be exploited by cyber attackers,...
Google claims to have spotted and disrupted several phishing campaigns in Iran - attempts to compromise tens of thousands of email accounts...
A new era of secure passwords could be upon us with a facial password system that can unlock phones using facial expressions...
Facebook has announced that it will now introduce clickable hashtags on the social network. Thus, the site will function as the Mark Zucerberg...
A Saudi hacker going with the handle of Dr.TaiGar from Group Hp Hack has hacked and defaced the official websites of United Nation and United Nation...
A group of Indonesian hackers from Biang Kerox Team have hacked and defaced 127+ Israeli based websites. Team left their deface page along...
The “sophisticated” malware for Android has been “unleashed”. Identified by the company specializes in cyber security Kaspersky, the Trojan “Backdoor.AndroidOS.Obad.a” is a threat virtually impossible to be...
An Algerian hacker going with the handle of DZ27 has hacked and defaced two sub-domains of Saudi Arabian Ministry of Higher Education (mohe.gov.sa) four days...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage