It seems as #OpTurkey is taking heights as more hackers are joining in as in latest hack the Turkish hackavists from Turk Hack Team...
Yet another day, yet another hack where a Kurdish hacker going with the handle of ‘SA3D HaCk3D has hacked and defaced total...
A group of hackers from China Blue Army are claiming to breach the official website of Shalom Hartman Institute of Israel (hartman.org.il), ending up...
A hacker going with the handle of OxAlien has hacked the official website of Virgin Radio Dubai (virginradiodubai.com) yesterday, as a result the database has...
In our previous post on Operation Hangover, we revealed the existence of an attack group, apparently operating from within India, who were...
A top internet security official in China has said that his organization has “mountains of data” on U.S. cyber attacks against the...
Online hackavists from Syrian Electronic Army (SEA) and Anonymous hackers have conducted a massive cyber attack on high profile Turkish government websites...
The upcoming 8.1 update to Windows 8 will offer improved fingerprint security - including the option to secure folders using a fingertip,...
Silicon Valley technology firms should take the lead in defending the private sector against cyber attacks, says Paul Rosenzweig, a former Department...
Anti-government protests are raising in Turkey, so as the protest on Turkish cyber space where 145 Turkish websites have been hacked and...
A Syrian hacker going with the handle of Security Dr@Gon has hacked and defaced 34 Turkish websites out of which 4 belongs to...
A team of security researchers at Georgia Institute of Technology have found a way by which any iOS device can be hacked within...
Two Pakistani hackers going with the handle of Dr.FreaK & Xploiter, today have hacked and defaced two official websites of India’s government of...
A fake iPhone charger could be used to bypass the defenses of Apple's smartphone, three researchers from Georgia Tech have claimed. In...
Cybercriminals are using online car auctions and photo-sharing services to dupe victims into downloading malware, the FBI has warned. Once infected, the...
Evernote and LinkedIn have both added an option for two-factor authentication in the past few days - days after Twitter announced its...
Motorola has revealed plans for hi-tech authentication systems that could make accessing data faster and easier - including a “tattoo” with embedded...
A hacker going with the handle of Cyber-Jihadi had hacked and defaced the official website English Defence League (englishdefenceleague.org). The site’s home page...
The free open-source content management system Drupal has reset all Drupal.org passwords after unknown attackers gained access to user account data including...
The drones which fly at the height of 150 yards will be utilized at the graffiti “hotspots” such as the big German...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment