GHIDRA is NSA’s reverse engineering tool released earlier this month. Earlier this month, Hackread.com posted about the National Security Agency’s (NSA) publicly releasing...
A list of the top 10 most exploited vulnerabilities in 2018 has revealed that Microsoft Office was the favorite victim of cybercriminals. Microsoft...
MySpace says it happened during a server migration project. Last time the once prominent social network website MySpace made headlines in 2016 after it...
By using the bug, hackers are desperately dropping persistent malware through generic trojan on systems using the old version of WinRar. McAfee security firm’s...
Hackers are after anyone seeking Pakistani passport while there is no response from the website’s administrator. Researchers at information security firm Trustwave...
Another day, another data breach; this time, Victor Gevers, a Dutch security researcher from GDI Foundation has discovered a publically exposed database...
It wasn’t very long ago that I revealed that most free VPN services are provided as a front for the big corporations...
Verifications.io breach is one of the largest data breaches but the good news is that it does not involve passwords. Another day,...
By gaining access to the vehicles, hackers can not only locate them but also open their doors and even turn off the...
The cybersecurity researchers at Trend Micro have discovered A new malware strain tapped into GitHub posts and Slack channels. Dubbed Slub by researchers; the malware works by exploiting...
While P2P file sharing isn’t illegal, torrent websites turn out to be the biggest sources to download copyright-protected media. Due to a plethora...
Cybercriminals often use torrent services to distribute malicious code since users who look for illegal content usually disable their privacy and security...
Are you planning to hand over admin access of your WordPress site to someone else? You certainly need to take some steps...
The IT security researchers at Sixgill‘s threat intelligence team have identified an “experienced threat actor” on the dark web selling access to...
The Pirate Bay was caught twice secretly mining Monero cryptocurrency using Javascript powered by Coinhive. Popular in-browser crypto-mining service will be shutting down...
procedural security is what we call operational security (OPSEC), it is kind of risk management process that encourages admin to monitor operations...
A database hosted on Amazon Web Services (AWS) and owned by Dow Jones has accidentally been exposed putting approx. 2.4 million corporate...
A team of researchers has disclosed their findings at the NDSS (Network and Distributed System Security) symposium 2019 held in San Diego,...
Google always Maintain the Extremely strong Cyber Security Culture for Data Security, Network Security, Cloud Security and Physical security. Google’s this extreme...
Does your VPN leaks DNS data? Does the DNS testing tool you’re using shows actual or sponsored results for affiliate marketing? Virtual...
If you are using passwords in multiple Web services etc., if that one-and-only password gets leaked, your entire Internet identity and access...