Pegasus spyware has been here for years. We must stop ignoring it
On July 18, a group of 17 newspaper and media organizations—aided by Amnesty International’s Security Lab and the research group...
On July 18, a group of 17 newspaper and media organizations—aided by Amnesty International’s Security Lab and the research group...
A citizen of Sweden was sentenced to 15 years in prison for manipulating a cryptocurrency scam claiming to pay investors...
On Saturday 10th of July, just after a cyber interruption in IRNA's computing devices, the official IRNA media outlet announced...
Smartphones, unlike PCs, involve a range of radios – generally cellular, Wi-Fi, Bluetooth, and Near Field Communication (NFC) – that...
The case of the infamous spyware Pegasus has taken the world by storm, with news revealing its unlawful use infringing...
Have you ever wanted a simple, easy and stealth bypass for multiple classes of security products? pstf^2 (pronounced pstf-square) is...
Beanshooter is a command line tool written in Java, which helps to identify common vulnerabilities on JMX endpoints.IntroductionJMX stands for...
Researchers from threat intelligence firm Group-IB helps Dutch police identify members of phishing developer gang known as Fraud Family. Group-IB,...
U.S. CISA released an alert today about several stealth malware samples that were found on compromised Pulse Secure devices. The...
A database belonging to TicketClub Italy, a company providing coupons platform for offline purchases, is available for sale on darkweb...
Experts found a DB containing sensitive health insurance data belonging to customers of US insurance giant Humana. An SQL database...
French cyber-security agency ANSSI warned of an ongoing cyberespionage campaign aimed at French organizations carried out by China-linked APT31 group....
In July 2021, the United Kingdom based website Guntrader suffered a data breach that exposed 112k unique email addresses. Extensive...
Whether you’ve read up on Greek mythology or you’re simply a big fan of Marvel comics, the name “Zeus” should...
We’ve written at length about account compromise and identity theft, and how criminals will often hijack accounts belonging to dead...
Users with low privileges can access sensitive Registry database files on Windows 10 and Windows 11, leaving them vulnerable to...
The billionaire said he had known since 2018 that one of his phone numbers was on the NSO Group list,...
Threat actors are targeting people who died in the June 24 collapse of Champlain Towers South in Surfside by ransacking...
On Tuesday, security experts confirmed the existence of a previously undocumented malware strain named "MosaicLoader," which targets people looking for...
A new hacking gang TA2721 also commonly known as Caliente Bandits has been tracked by Proofpoint researchers since January 2021....
NSO Group, an Israeli cyber intelligence firm, developed Pegasus spyware as a surveillance tool. As claimed by the corporation, this...
Download full report (PDF) As cyberattacks become more sophisticated, and security solutions require more resources to analyze the huge amount...
Why crack hashes when you can bust them?FeaturesAutomatic hash type identification Supports MD5, SHA1, SHA256, SHA384, SHA512 Can extract &...
Check Point Research (CPR) experts have spotted a cheap malware, dubbed XLoader variant, which was upgraded to target both Windows and...