The threat actor behind the Fodcha distributed denial-of-service (DDoS) botnet has resurfaced with new capabilities,...
In today’s world of automated hacking systems, frequent data breaches and consumer protection regulations such...
An unofficial patch has been made available for an actively exploited security flaw in Microsoft...
A now-patched security flaw has been disclosed in the Galaxy Store app for Samsung devices...
Cloud-based repository hosting service GitHub has addressed a high-severity security flaw that could have been...
Communication services provider Twilio this week disclosed that it experienced another “brief security incident” in...
The hacker known as Monkey Drainer used phishing techniques to steal from their victims...
Multiple high-severity security flaws have been disclosed as affecting Juniper Networks devices, some of which...
1 Comment
Five malicious dropper Android apps with over 130,000 cumulative installations have been discovered on the...
Cloud computing was the lifeline that kept many companies running during the pandemic. But it...
A recently discovered hacking group known for targeting employees dealing with corporate transactions has been...
The increased use of information technology in our everyday life and business has led to...
Google on Thursday rolled out emergency fixes to contain an actively exploited zero-day flaw in...
The Raspberry Robin worm is becoming an access-as-a-service malware for deploying other payloads, including IcedID, Bumblebee, TrueBot (aka Silence),...
The NCSC’s threat report is drawn from recent open source reporting....
A 34-year-old U.K. national has been arraigned in the U.S. for operating a dark web...
As many as 85 command-and-control (C2) servers have been discovered supported by the ShadowPad malware since September...
Automobile, Energy, Media, Ransomware?When thinking about verticals, one may not instantly think of cyber-criminality. Yet,...
A now-patched security flaw in Apple’s iOS and macOS operating systems could have potentially enabled...
Australian health insurance firm Medibank on Wednesday disclosed that the personal information of all of...
A new cryptojacking campaign has been uncovered targeting vulnerable Docker and Kubernetes infrastructures as part...
Ian Levy, the NCSC’s departing Technical Director, discusses life, the universe, and everything....
A 26-year-old Ukrainian national has been charged in the U.S. for his alleged role in...
If you regularly read The Hacker News, there’s a fair chance that you know something...
The North Korean espionage-focused actor known as Kimsuky has been observed using three different Android...
The threat actor behind a remote access trojan called RomCom RAT has been observed targeting...
A cybercrime group known as Vice Society has been linked to multiple ransomware strains in its malicious...
Cisco has warned of active exploitation attempts targeting a pair of two-year-old security flaws in...
VMware on Tuesday shipped security updates to address a critical security flaw in its VMware...
A high-severity vulnerability has been disclosed in the SQLite database library, which was introduced as...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.