Capcom Co., Ltd , is a Japanese developer and publisher of video games, known for creating multi-million-selling franchises such as Mega Man, Resident...
The EU’s cyber security agency ENISA has published its Cyber Threat Landscape analysis of 2012 which puts drive-by-exploits as the top web...
A Java vulnerability seemingly discovered by a French researcher has been confirmed by the US Government.
The hacker going by the handle of DarkWeb Goons has contacted us with his latest hack in which he hacked into the...
U.S.A has been one of the prime centers of cyber crimes in recent times and we this time around came to know...
An Indonesian based hacking group identifying itself as Jember Hacker Team (JHT), hacked and defaced the official website of Indonesian President Susilo Bambang...
As part of an EU drive to combat the growth of cybercrime across member states a new European Cybercrime Centre (EC3) based...
Apple Is now working upon cheaper iPhones, which are said to be sold within the bracket $300 to $400. This particular price is...
In a story that could be lifted direct from a Hollywood script, a Japanese hacker placed a memory card on the collar...
The hacker @Gevolus from Brazilian Cyber Army has hacked into the off web-server of US Department of Defense’s Non-Lethal Weapons Program (jnlwp.defense.gov) and left with posting highly sensitive...
The online hackavist group Anonymous has launched its new operation and named it #Operation Unite against the President Obama’s signing over/passing a bill during...
Can you imagine your voice being heard from miles away, even you are talking with someone verbally and that is too your...
In an report published by TNW, it has been revealed that despite of several claims by Yahoo Inc, the DOM-based XSS Vulnerability that resulted in compromising...
@Gevolus from Brazilian Cyber Army hacked into the server of Mississippi State University’s sub-domain (veterans.msstate.edu) and left with posting confidential login information of university’s staff...
A new cyber crime unit has been launched in EU with the name of EC3, the unit has been established at Hague,...
The famous hacking group Moroccan Ghosts has defaced the official website of Syrian Industrial Bank (industrialbank.gov.sy). The site was already defaced twice by Anonymous hackers. ...
The well known unstoppable hacking machine aka Hmei7 defaced from Indonesia has hacked the official website St. Charles County Government Website (sccmo.org). The hacker left a...
RedHack, the most professional hackavism group from Turkey has hacked the official “online data sharing portal” of Turkey’s Higher Education Council (yok.gov.tr) this...
2012 was another fine year for Google and the statistics prove this quite clearly. Google was probably one of the most benefited brands of...
Yahoo users 2 nights’ back were hacked by probably the same spammy links route. A number of Yahoo users complained about their...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment