An ultimate level of spy has been manufactured by the BAE systems as part of their contract with DAPRA (Defence Advanced Research Project Agency)....
A prototype multi-cursor system designed to improve the security of on screen password entry has been posted onto DigInfo, the Tokyo based...
The official website of ACER electronic’s service center for Thailand has been hacked and partially defaced by Samurai of TurkHackTeam. The hacker contacted me today...
A group of Malaysian hackers from Local Army Crew have collectively hacked and defaced 25 Israeli websites in support of Palestine. A...
A young heartless mum has been arrested for an attempt to sell her Children on Facebook to bail out her husband from...
A group of Russian motorists from Tula Oblast have modified an old Opel Vectra into a remotely controlled automobile that can be driven through...
The official website of one of India’s most high profile defense organization, Defense Research and Development Organization (DRDO) (www.drdo.gov.in) was hacked and breached...
Below, you can see the textual part of a bank phishing email I received today (it also contained a Smile logo, which...
Earlier I wrote about BackTrack renaming itself as Kali Linux or BackTrack 6 will be available for download soon, today is the day...
A deep dive into Win32/Theola, one of the most malicious components of the notorious bootkit family, Win32/Mebroot.FX. Theola uses malicious Chrome browser...
A new malware spreading rapidly on Facebook bluffing users into clicking an app link that supposedly allows Fake Facebook Black template replacing...
Microsoft has found seven vulnerabilities in its programs and has deemed of them critical. The critical are so serious that officials have...
A hacker going with the handle of redMin has hacked and defaced the official website of Toshiba Corporation a Japanese multinational engineering and electronics...
An official at White House has warned China to take “serious steps” in tackling cyber-crimes originating from its cyber space, as it has...
The Associated Press reports that celebrities, including ashton Kutcher and Kim Kardashian, along with top government officials have had private financial information...
Reports from Asia say that Singapore is to open a new Cyber Security Lab in a bid to combat criminal hacking by...
Anonymous Hackers have published personal financial records of some high profile celebrities, musicians and politician like US Vice President Joe Biden, Attorney General Eric...
The official Facebook page of former Secretary of State and a retired four-star general in the United States Army was hacked few hours ago, resulting...
A group of Serbian students penetrated into the security of a billboard advertisement which stands tall at a crowded and much eminent location...
Respected security blogger Brian Krebs reports that an “explosion in Android malware” is being fuelled by a growing market for hijacked of...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage