Apple’s customers would be itching to get their devices updated iOS 6, which was recently launched by Apple. iOS 6 is said...
The official website of Kurdish News Network www.knntv.net has been hacked by famous Turk Hack Team from Turkey. The Samurai hacker from Turk Hack...
ESET’s threat researchers received a surprise earlier this week when they began receiving reports from ESET LiveGrid that downloads of ComboFix, a...
Following the examples of Google, Facebook, Yahoo and DropBox, Twitter is reportedly ready to roll out a two factor sign in process...
A researcher by the name of Debasish Mandal has found critical command executing vulnerability on the latest versions 2.0.5 and earlier on famous VLC...
I received a “shared” messages from a friend about “a leaked scandal video of Justin Bieber and Selana Gomez” promising a “naked...
The online hackavist group Anonymous have claimed to hack the official website of Alabama Criminal Justice Information Center and appear to post login credentials...
At the beginning of January 2013, we started tracking the interesting Win32/Redyms trojan family. Redyms is notable for changing search results from...
Kaspersky, one of the leading security firms around the world has found something shocking in one of the android apps, which is...
In a report published by The Washington Free Beacon reports, the The Energy Department has been under massive cyber-attacks, as a result information...
The officials at Pelephone, Israel’s major cellphone provider company has announced that it was never hacked and cyberattack was never the cause for its...
The official website of Pakistan’s one of the oldest and biggest media giant newspaper Jang.com.pk, owners of Geo News has been hacked and defaced...
Online hackavist group Anonymous have decided to go against Italian government owned websites against the ongoing corruption inside the country. In a...
The hackers from Syrian Electronic Army have hacked into the mail server of Israeli News website Haaretz (haaretz.com), as a result around 100 usernames,...
Do you surf facebook for hours? And would like to have some additional functions to your tiny world of friends? Well, if...
Some unknown hackers have infiltrated the social media website Twitter, as a result the account information of around 250,000 of its users have...
The official website of British Chamber of Commerce for Luxembourg has been breached and as a result login information of around 900 users have...
Social media has now become a difficult place to survive, this came into light when one Filipino solicitor discussed a cyber crime...
Backtrack development team has announced that Backtrack is in process of a major change and the operating system will replaced by the name...
Wall Street Journal has announced that just like New York Times, their computers were also hacked by hackers from China making it...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage