
Researchers found affected users in Italy and Kazakhstan Google is warning Android and iOS users about a sophisticated spyware that is getting the help from Internet Service Providers (ISPs) in attacking its... Read more »

Hacks confirmed at gambling and betting websites in Southeast Asia, rumors of other hacks in Europe and the Middle East. Hackers, reportedly out of China, are targeting operations in the region, and... Read more »
An international law enforcement operation involving 11 countries has culminated in the takedown of a notorious mobile malware threat called FluBot. this Android malware has been spreading aggressively through SMS, stealing passwords, online... Read more »
The Ukrainian government has revealed it narrowly averted a serious cyber-attack on the country’s power grid. Hackers targeted one of its largest energy companies, trying to shut down substations, which would have... Read more »

A novel Bluetooth relay attack can let cybercriminals more easily than ever remotely unlock and operate cars, break open residential smart locks, and breach secure areas. The vulnerability has to do with weaknesses in... Read more »

Touting info on 6,700 compromised systems will get you four years behind bars A Ukrainian man has been sentenced to four years in a US federal prison for selling on a dark-web... Read more »

Hackers stole $180 million from a decentralized finance (De-Fi) in cryptocurrency form at Beanstalk Farms, San Francisco. Beanstalk has its own central funding pool, where people earn rewards by contributing money, the... Read more »

Zoom is the best in modern enterprise video, calling communications, with an easy, reliable cloud platform for video and audio conferencing, chat, collaboration, and webinars across digital devices, ( Mobile, desktops, telephones,... Read more »

INTRODUCTION: Since last 5 years around a new ransomware campaign infected server users around the world as part of the hashtag called #OpJerusalem campaign. It’s updated ransomware which is written in “Go”... Read more »

Since most security tools also keep an eye on the network traffic to detect malicious IP addresses, attackers are increasingly adopting infrastructure of legitimate services in their attacks to hide their malicious... Read more »