Security researchers have discovered yet another example of how cybercriminals disguise their malware activities as regular traffic by using legitimate cloud-based services....
Twitter has been hit with a minor data breach incident that the social networking site believes linked to a suspected state-sponsored attack....
Personal information for sale? A lot of those ‘merchandise’ are available in the Deep web today. The deep web is the part...
Cybersecurity researchers have discovered a critical vulnerability in widely used SQLite database software that exposes billions of deployments to hackers. Dubbed as...
Shamoon is back… one of the most destructive malware families that caused damage to Saudi Arabia’s largest oil producer in 2012 and...
Facebook’s latest screw-up — a programming bug in Facebook website accidentally gave 1,500 third-party apps access to the unposted Facebook photos of...
“Pay $20,000 worth of bitcoin, or a bomb will detonate in your building” A massive number of businesses, schools, government offices and...
Adobe is closing out this year with its December Patch Tuesday update to address a massive number of security vulnerabilities for just...
PrivilegeEsc-Linux is a simple script which checks the security on a Linux machine. It can run many different options, such as for...
Developers of phpMyAdmin, one of the most popular and widely used MySQL database management systems, today released an updated version 4.8.4 of...
Google today revealed that Google+ has suffered another massive data breach, forcing the tech giant to shut down its struggling social network...
A new Google+ bug that has probably hit the accounts of about 52.5 million users has made Google think of shutting down...
Two hackers have been sent to prison for their roles in hacking TalkTalk, one of the biggest UK-based telecommunications company, in 2015...
It seems as though not a day goes by without a new story breaking about a high-level cyber attack on a major...
This is why you should always think twice before opening innocent looking email attachments, especially word and pdf files. Cybersecurity researchers at...
The real identity of Tessa88—the notorious hacker tied to several high-profile cyber attacks including the LinkedIn, DropBox and MySpace mega breaches—has been...
Here we have great news for all bug bounty hunters. Now you can get paid up to $40,000 for finding and responsibly...
Earlier this week Dropbox team unveiled details of three critical vulnerabilities in Apple macOS operating system, which altogether could allow a remote...
The United States Postal Service has patched a critical security vulnerability that exposed the data of more than 60 million customers to...
A widely used third-party NodeJS module with nearly 2 million downloads a week was compromised after one of its open-source contributor gone...
Cheetah Mobile—a prominent Chinese app company, known for its popular utility apps like Clean Master and Battery Doctor—and one of its subsidiary...