Analysis of a malicious backdoor serving Blackhole exploit pack found on Linux Apache webserver compromised by malware dubbed Linux/Cdorked.A, together with remediation...
A hacker going with the handle Sultan Brain from Kurdish Elite Security Team has hacked and defaced three top SriLankan government owned news...
Israel Airport Security is now Allowed to Read Tourists Emails The officials at Ben Gurion airport of Israel have announced that from...
#OpUSA Hackers Claim to Leak 40,000 Facebook accounts for #OpUSA Different hackers from all over the world are conducting operation against the...
Adrian Price, Head of Information Security at Britain's Ministry of Defence, suggested that governments should devote 20% of their budget to protecting...
Hartford City and Jefferson County, Wisconsin Websites Hacked & Defaced by Nob0dy Hacker A hacker going with the handle of NobOdy has hacked...
An independent security researcher from Pakistan, going with the name of Danish Tariq has claimed to found cross site scripting vulnerability (XSS)...
Twitter is said to be testing new security systems in the wake of a false Tweet from an official Associated Press account...
World renowned hackers from Syrian Electronic Army have hacked two official Twitter accounts of The Associated Press, which is a multinational non-profit news...
Half of British adults use the same password across all the websites they access, according to telecoms regulator Ofcom. The data comes...
Most cyber attacks are simple and predictable, relying on basic tactics and preventable employee errors, according to Verizon’s annual Data Breach Investigations...
On 15th April 2013, hacker going with the handle of Guccifer leaked hacked photos from Colin Powell’s personal email account showing the retired...
Ministry of National Defense – Polish Army, Websites Hacked and Defaced by Over-X Famous Algerian hacker Over-X has hacked and defaced six...
Twitter accounts used by CBS News were compromised on Saturday - and began serving up bogus news stories with links to malware.
A three-day “cyber war” ended in victory for a team from the U.S. Air Force Academy, who beat off attacks from hackers...
Two Indian hackers, going with the handles of Yamraaj & 404 !-!@!2$!-!@ have hacked and defaced the official website of Bangladesh’s Prime...
Hacktivists expose media’s refusal to report on private operatives at Boston bombings The mainstream media’s refusal to report on images showing private...
Anonymous Hackers Defaces Their Own Website for Cispa Blackout We have witnessed how Anonymous hackers attack government websites against its policies, but witnessing...
Hacker going with the handle of LulzPirate has hacked and defaced the official website of Prime Minister office of Tanzania (pmo.go.tz)along with 13...
A hacker going with the handle of Zifir from TurkishAjan Hacking Group has hacked and defaced the official website of Mercedes-Benz Austria including six...
Key Lesson from Microsoft’s Password Spray Hack: Secure Every Account
AWS Patches Critical ‘FlowFixation’ Bug in Airflow Service to Prevent Session Hijacking
China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws
Massive Sign1 Campaign Infects 39,000+ WordPress Sites with Scam Redirects
Russian Hackers May Have Targeted Ukrainian Telecoms with Upgraded ‘AcidPour’ Malware
AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials
Making Sense of Operational Technology Attacks: The Past, Present, and Future
Ivanti Releases Urgent Fix for Critical Sentry RCE Vulnerability
Atlassian Releases Fixes for Over 2 Dozen Flaws, Including Critical Bamboo Bug
TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks
Ukraine Arrests Trio for Hijacking Over 100 Million Email and Instagram Accounts
APIs Drive the Majority of Internet Traffic and Cybercriminals are Taking Advantage
From Deepfakes to Malware: AI’s Expanding Role in Cyber Attacks
Crafting and Communicating Your Cybersecurity Strategy for Board Buy-In
Suspected Russian Data-Wiping ‘AcidPour’ Malware Targeting Linux x86 Devices
New Phishing Attack Uses Clever Microsoft Office Trick to Deploy NetSupport RAT
New DEEP#GOSU Malware Campaign Targets Windows Users with Advanced Tactics
Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool
Hackers Using Sneaky HTML Smuggling to Deliver Malware via Fake Google Sites
WordPress Admins Urged to Remove miniOrange Plugins Due to Critical Flaw