Iranian hacker laptop with binary computer code and Iran flag on the screen. Internet and network security.

Iranian Hackers Target Israeli Citizens in Cyber Attack

State-sponsored hackers from Iran have targeted Israeli citizens who are believed to possess information regarding certain people of interest.ClearSky, a cybersecurity firm based in...

Russian Darknet Hacker Extradited to US from Bulgaria

One of the eight hackers accused of false advertising schemes on the dark web in November 2018 has now been extradited to the United...
Physical version of Bitcoin (new virtual money) and North Korea Flag. Conceptual image for investors in cryptocurrency and Blockchain Technology in North Korea.

North Korea Targets More Cryptocurrency Firms

Inside North Korea’s efforts targeting hacks to cryptocurrency companies for financial gains.
hbo under attack

HBO Under Attack as Hackers Threaten to Leak Series

The popular American television network HBO has suffered a hack on its social media accounts, but what’s more concerning is the attackers have gained...
Pharming Alert on a Red Binary Danger Background

Pharming: Everything You Need to Know

Information Technology crime has become a well-established business where cybercriminals are mainly in for economic benefit.These malicious actors are increasingly using techniques that target...

Azorult Malware Advertised for Sale on Darknet Forums

Cybercrime has been greatly assisted by the free sale of hacking tools via the dark web.Recently, an updated version of Azorult, a type of...
username and password in binary background

Data Breach at TIO Networks, A Subsidiary of PayPal

TIO Networks, a Canada-based subsidiary of PayPal that offers digital payments services, has experienced a security breach in which the data of nearly 1.6...

Cyber Espionage Increasingly Common Among Governments

In the wake of increased cyber activities among governments globally, it is no doubt that some countries will employ whatever technological means available to...
remote desktop protocol in the form of binary code, 3D illustration

Continuous Exploit of RDP Pushes FBI to Issue Warning to Potential Targets

The Internet Crime Complaint Center (IC3), a department of the Federal Bureau of Investigation, recently released a statement alerting companies who do not regularly...

Gaming Keyboards that Contain Keyloggers

Espionage is a vice that is put into practice at large by various parties intending to dig out more information or collect data due...
water drops on the Hewlett Packard logo

HP is Installing Telemetry Bloatware Without Users’ Consent

Hewlett Packard (HP) is discretely installing a form of spyware known as telemetry bloatware without the consent of the owner of the desktop machine...

Darknet Vendor Is Selling Stolen Data from Major Crypto Exchanges

A vendor from the darknet site Dread recently confirmed he is selling KYC (know-your-customer) user data from largest cryptocurrency exchanges directly on the dark...

Hacked ‘Fortnite’ Data Surfaces on the Dark Web

Recently, personal data belonging to players of the popular game Fortnite has appeared on the dark web.Hackers reportedly obtained the information from the system’s...
Uber building

Data Breach at Uber Technologies Affects Approximately 57 Million Persons

For more than a year now, Uber Technologies has remained mute about a massive breach at the tech firm where hackers obtained personal details...
Asylum papers on a table

Fugitive Hacker, Activist Seeks Asylum in Mexico

A hacker from the group known as Anonymous has been on the run for a long time now. This time around, Anonymous is asking...

Israeli Firm ‘Candiru’ Offers Cyberattack Services on the Dark Web

A recent report revealed that a cybersecurity company from Israel is offering phone and computer-spying services to customers on the dark web.The spying services...
Domain name choice concept. Knob switch button and website internet domain names

DNS Spoofing Explained

In simple terms, the act of diverting an internet user to a false IP address is called DNS spoofing.Some in the trade call it...

Hackers Arrested as They Attend Hacking Conference

Marcus Hutchins, the British hacker who helped contain the recent spread of the notorious WannaCry ransomware, has been arrested while attending the DEFCON conference...
travel agency website

Hong Kong Travel Agency Suffers Major Data Hack

Hong Kong is one of the world’s top tourist hubs. It’s an administrative center with an expanding threshold of businesses basing their headquarters in...

Hacking in the Aviation industry

In the wake of increased cybercrime, we see that the threat of hackers gaining control over planes in motion is indeed possible.In some documented...

Dark Overload Sought to Recruit Members Before Leaking 9/11 Documents

While it might sound counterintuitive, it appears as though the hacker group The Dark Overlord was actively seeking attention before its recent data dump...

AfricaHackOn: Group in Africa Aims to Create & Improve Cyber Security

AfricaHackon, a cyber security firm established in the East African region in collaboration with relevant stakeholders, aims to raise awareness about internet security and improve it as well.

An Inside Look at US-China Relations Regarding Cybersecurity

The relationship between China and the United States has changed drastically over the last few years.The diplomatic understanding between these two countries has significantly...

Israel Hacked Kaspersky, Alerted U.S. of Russian Hacking Attempts

Russian hackers were allegedly caught in the act by Israeli intelligence officials for attempting to spy and obtain confidential information from the U.S. government.This...
laptop with North Korea

North Korea Hack Compromises South Korea’s Military Blueprint

North Korea has been on the global watch list for a long time now. This is out of the mere fact that it has...

The Dark Overlord Hacking Group Leaks Stolen 9/11 Files

After several days of threats, infamous hacking group The Dark Overlord has delivered on its promise to release a series of stolen 9/11 documents...

New Advanced Malware Targeting Windows Computers Available on the Dark Web

There is new hacking tool making rounds in dark web forums reportedly capable of stealing data, mining cryptocurrencies and avoiding detection from anti-malware tools.The...
The homepage of the official website for the Reddit social news website, on 20th April 2017.

Reddit Hit by Security Breach, User Data Exposed

Reddit has recently revealed that it suffered a security breach which subsequently exposed substantial user data.Confirming the incident through an official statement, Reddit Chief...

Malicious Torrent File Malware Capable of Altering Crypto Addresses

A malicious file capable of stealing cryptocurrencies was recently caught infiltrated as a movie torrent on The Pirate Bay torrent tracker.The Windows shortcut that...

Hackers Are Using These Tools to Reel in New Victims

Illegal cyber operations have currently gained momentum as attackers have invested in a variety of hacking tools to use to attack people.These hacking tools...
Cyber crime hand reaching out through laptop computer

10 Signs You’ve Been Hacked – and What to Do Next

While getting hacked has become almost as common as breathing, it is not easy to tell when your computer has been compromised. Fraudsters are...

Researchers Reveal Suspect Behind Collection #1 Mega Breach

A U.S.-based cybersecurity firm, Recorded Future, alleges to have identified a hacker allegedly responsible for exposing stolen data in a recent leak dubbed Collection #1.Experts from Recorded Future’s threat...

Hacking Group “Shadow Brokers” Threatens to Unmask Former NSA Hacker

The Shadow Brokers, a hacking group famed to the perpetrators behind an infamous NSA hack in which several exploits were stolen, is now threating...

Spanish Court Extradites Russian Hacking Suspect to the United States

The Spanish high court has come to a conclusion to extradite Pyotr Levashov, a Russian hacker, to the United States.He is purported to be...

Hackers on the Dark Web Are Targeting Crucial Data in Police Websites

Private data belonging to over 350 citizens in Bengaluru, India has been leaked on the dark web after the websites of Karnataka State Police...
Exclusive Interview Microphone Questions Answers Show 3d Illustration

Exclusive Interview with Commander X

Christopher Doyon, more commonly known by the pseudonym Commander X, has been one of the hacktivist communities’ more public figures in recent years, known...
A red sign with text Hacking in Chinese flag colors on a keyboard

The United States Charges Chinese Citizens Over Hacking

Three Chinese based hackers have been charged by a Unites States court with hacking into companies and stealing sensitive information from them.The hackers were...
kenyan elections hacked

Results of Kenya’s Presidential Tally Hacked, Claims Opposition Leader

As countries embrace technology in conducting their general elections, it is no doubt that a section of key players might employ dubious means to...

Get Ready to Be Carjacked in 2018. Or Not.

You may have heard of the recent spurts in carjacking all over the globe by a new breed of smart thieves.Perhaps you brushed it...

Mega Breach Leads to Circulation of 2.2 Billion Records in Hacking Forums

In January, a portion of breached databases from several sources was first identified by Troy Hunt, a well-known security researcher.As has been reported, the...

How to Become a Professional Hacker — 10 Credible Tips for Beginners

Anyone can write up an outlandish cyberpunk username and pose as a hacker. However, there is so much that goes into becoming a professional...
DNS word cloud

What is a DNS Rebinding Attack?

DNS rebinding is a Domain Name System-based attack on the codes embedded in a webpage.Through DNS rebinding, an attacker can compromise unpatched internal systems,...
Crypto Currency Word Cloud

DUHK: A New Crypto Attack Discovered

The type of hacking attempts that take place in modern times overthrow every security claim and gain access to even the most impenetrable systems...
Online crime scene with a finger print left on backlit keyboard with Chinese flag on it

200 Million Japanese Users’ Data Sold on the Dark Web by Chinese Hackers

Hackers peddling stolen data on the dark web may not be something new. But a report suggests that one forum in the dark web...
Judges Gavel Computer Keyboard And Real Handcuffs On The Rough Brown Wood Table

Hacker Who Orchestrated Spear Phishing Attack Targeting Yahoo Accounts Pleads Guilty

A 22-year-old Canada-born hacker by the name of Karim Baratov has pleaded guilty to charges of assisting Russian federal officers in accessing hundreds of...

Darknet Cybercriminals Capitalize on Black Friday

“Black Friday,” or the day after Thanksgiving, has become an international consumer phenomenon, where buyers all around the world search the internet and brick-and-mortar...

773M Email Addresses and 21M Passwords Exposed in Data Dump

A data breach containing more than 773 million emails and 21 million passwords was discovered online by Troy Hunt, a security developer and regional...

Dossier by WikiLeaks Shows How The CIA Spies On Its Targets

WikiLeaks released a dossier, dubbed Vault 7, demonstrating how the U.S. Central Intelligence Agency (CIA) gathers intelligence by spying on their perceived targets and...

Australian Navy Shipbuilder Targeted by Iranian Hackers

Australian defence shipbuilder Austal recently announced that they had experienced a cybersecurity breach in their data management system.There was no known suspect at the...

NSA Breach Allegedly Linked to Russian Company

It is now confirmed—the United States National Security Agency has been hit again by a cyber attack.This time, a cyber security company linked to...

Send this to a friend