Who Needs a Botnet when you have a 4 Gbps DDoS Cannon? In recent months the DDoS world has shifted from complex...
33 Israeli Websites Hacked by CapoO_TunisiAnoO The hardcore anti-Israeli hacker from Tunisia going with the handle of CapoO_TunisiAnoO is back, this time after...
A recent image from Google earth took everyone by surprise as it showed rare images of a person’s murder. The image clearly...
Analysis of a malicious backdoor serving Blackhole exploit pack found on Linux Apache webserver compromised by malware dubbed Linux/Cdorked.A, together with remediation...
A hacker going with the handle Sultan Brain from Kurdish Elite Security Team has hacked and defaced three top SriLankan government owned news...
Israel Airport Security is now Allowed to Read Tourists Emails The officials at Ben Gurion airport of Israel have announced that from...
#OpUSA Hackers Claim to Leak 40,000 Facebook accounts for #OpUSA Different hackers from all over the world are conducting operation against the...
Adrian Price, Head of Information Security at Britain's Ministry of Defence, suggested that governments should devote 20% of their budget to protecting...
Hartford City and Jefferson County, Wisconsin Websites Hacked & Defaced by Nob0dy Hacker A hacker going with the handle of NobOdy has hacked...
An independent security researcher from Pakistan, going with the name of Danish Tariq has claimed to found cross site scripting vulnerability (XSS)...
Twitter is said to be testing new security systems in the wake of a false Tweet from an official Associated Press account...
World renowned hackers from Syrian Electronic Army have hacked two official Twitter accounts of The Associated Press, which is a multinational non-profit news...
Half of British adults use the same password across all the websites they access, according to telecoms regulator Ofcom. The data comes...
Most cyber attacks are simple and predictable, relying on basic tactics and preventable employee errors, according to Verizon’s annual Data Breach Investigations...
On 15th April 2013, hacker going with the handle of Guccifer leaked hacked photos from Colin Powell’s personal email account showing the retired...
Ministry of National Defense – Polish Army, Websites Hacked and Defaced by Over-X Famous Algerian hacker Over-X has hacked and defaced six...
Twitter accounts used by CBS News were compromised on Saturday - and began serving up bogus news stories with links to malware.
A three-day “cyber war” ended in victory for a team from the U.S. Air Force Academy, who beat off attacks from hackers...
Two Indian hackers, going with the handles of Yamraaj & 404 !-!@!2$!-!@ have hacked and defaced the official website of Bangladesh’s Prime...
Hacktivists expose media’s refusal to report on private operatives at Boston bombings The mainstream media’s refusal to report on images showing private...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment