The U.S. Department of State is paying an additional $5 million to anyone who can provide information leading to the arrest or...
The 22-year-old British national Joseph James O’Connor, aka PlugwalkJoe, was one of the hackers behind 2020’s massive Twitter hack – PlugwalkJoe also stole...
The data leak took place last month when the infamous Conti ransomware gang hacked Graff, a UK-based jewelry store Graff popular amongst...
Iranian Hackers Leaked Private Messages and sensitive data of 690,000 Israeli LGBTQ Dating App Atraf Users After $1 Million Ransom is Denied....
While examining Wi-Fi networks in Tel Aviv, Israel, 70% or around three-quarters of home and small-scale office Wi-Fi network passwords were vulnerable...
Trojan Source attack impacts all popular programming language compilers, such as C, C++, C#, Java, JavaScript, Python, Rust, and Go. A research...
Soon after the cyberattack, videos and posts started surfacing on social media displaying messages that read: “Khamenei! Where is our gas?” Another...
Cybersecurity researchers disclosed details of what they say is the “largest botnet” observed in the wild in the last six years, infecting...
Reportedly, the database also contains personal information of Argentinian President Alberto Fernández, football superstars Sergio Aguero and Lionel Messi. After the infamous...
The latest cloud security breaches show that we have miles to go as we keep fighting to keep our sensitive data safe. ...
The vulnerability in WinRAR trialware could be abused by a remote attacker for executing arbitrary code on any system thus, getting an...
So far, Microsoft has informed 140 companies about the new attack campaign being carried out by Nobelium 14 of which were compromised...
Cybersecurity researchers on Friday disclosed a now-patched critical vulnerability in multiple versions of a time and billing system called BillQuick that’s being...
Automated purple teaming is one of the best ways to address cybercrime as it does not only test for the deficiencies in...
In July 2021 the REvil ransomware group vanished due to mounting US pressure after the Kaseya attack. However, the group was back...
Cybersecurity researchers on Tuesday took the wraps off a mass volume email attack staged by a prolific cybercriminal gang affecting a wide...
What is a data breach? A data breach is a security lapse where a non-authorized person can assess sensitive information without authorization....
Tianfu Cup is the Chinese version of the Pwn2own in which hackers from Kunlun Lab managed to secure first place by hacking...
Representatives from the U.S., the European Union, and 30 other countries pledged to mitigate the risk of ransomware and harden the financial...
Microsoft has warned that hackers linked to Iran are mainly targeting Office 365 clients in defense technology firms. Researchers at Microsoft Threat...
Cybersecurity companies are the backbone to fight cybercrime – Let’s dig deeper into which cybersecurity company is doing what and how. Cybersecurity...