Two New MageCart Attack Victims: Sixth June, American Cancer Society

Today we report about further prey of the notorious MageCart

Researcher Finds Vulnerability in Japanese Hotels Tapia Robots

Internet-of things is seemly always vulnerable to security flaws. From

17 Malicious iPhone Apps On App Store Found Targeting Users With Adware

Scammers and criminal hackers always seem to find a way

Samsung Patched The Galaxy S10 Fingerprint Reader Flaw

A few days earlier, Samsung’s flagship phone came into limelight

FTC Banned Retina-X Spying Apps Until Proven For Legitimate Use

The Federal Trade Commission has taken some robust steps towards

B2B Payment Service Billtrust Went Down After Ransomware Attack

One more firm has now emerged as a victim of

Remote Code Execution Vulnerability Found In Trend Micro Anti-Threat Toolkit (ATTK)

The Anti-Threat Toolkit (ATTK) by Trend Micro is a dedicated

Hackers Breach Avast Through Old Internal VPN Profile

The popular cybersecurity firm Avast has revealed a cyber attack

Hackers Deployed Fake UpdraftPlus Plugins With Backdoor To Infect WordPress Websites

Once again, hackers have devised a new strategy to infect

NordVPN Discloses Server Breach That Could Have Potentially Allowed For Traffic Monitoring

Extending the list of firms suffering a breach, now joins

UC Browser Exposed Millions Of Users To MiTM Attacks via Third-Party APK Download

Once again, the UC browser has made it into the

Researcher Discovers Critical Linux WiFi Vulnerability That Existed For Four Years

Linux users unknowingly remained vulnerable to a serious security flaw

Google Pixel 4 Has A Nasty Face Unlock Bug

Google’s latest high-end phone Pixel 4 has just released. However,

Fake Tor browser stole Bitcoins from dark web users

The fake version was targeting users for years. Cryptocurrencies like

Dark web’s largest child porn marketplace seized; 338 suspects arrested

“This hidden site has been seized,” says the marketplace’s homepage.

Phorpiex Botnet Sending Out Millions of Sextortion Emails Using Hacked Computers

A decade-old botnet malware that currently controls over 450,000 computers

A Look Into Continuous Efforts By Chinese Hackers to Target Foreign Governments

Phishing is still one of the widely used strategies by

A pervert Yahoo employee hacked 6,000 accounts using internal system

Once hacking Yahoo Mail accounts, the employee also compromised accounts