New Cache Poisoning Attack Lets Attackers Target CDN Protected Sites
A team of German cybersecurity researchers has discovered a new cache poisoning attack against web caching systems that could be used by an attacker to [...]
NordVPN Breach FAQ – What Happened and What's At Stake?
NordVPN, one of the most popular and widely used VPN services out there, yesterday disclosed details of a security incident that apparently compromised [...]
Cynet's Vulnerability Assessment Enables Organizations to Dramatically Reduce their Risk Exposure
Protection from cyberattacks begins way before attackers launch their weapons on an organization. Continuously monitoring the environment for security [...]
Stealthy Microsoft SQL Server Backdoor Malware Spotted in the Wild
Cybersecurity researchers claim to have discovered a previously undocumented backdoor specifically designed for Microsoft SQL servers that could allow [...]
Microsoft to Reward Hackers for Finding Bugs in Open Source Election Software
Fair elections are the lifelines of democracy, but in recent years election hacking has become a hot topic worldwide.Whether it's American voting [...]
Chrome for Android Enables Site Isolation Security Feature for All Sites with Login
After enabling 'Site Isolation' security feature in Chrome for desktops last year, Google has now finally introduced 'the extra line of [...]
Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted
Attention Linux Users!A vulnerability has been discovered in Sudo—one of the most important, powerful, and commonly used utilities that comes as a core [...]
Feds Shut Down Largest Dark Web Child Abuse Site; South Korean Admin Arrested
The United States Department of Justice said today that they had arrested hundreds of criminals in a global crackdown after taking down the largest known [...]
Phorpiex Botnet Sending Out Millions of Sextortion Emails Using Hacked Computers
A decade-old botnet malware that currently controls over 450,000 computers worldwide has recently shifted its operations from infecting machines with [...]
A Comprehensive Guide On How to Protect Your Websites From Hackers
Humankind had come a long way from the time when the Internet became mainstream. What started as a research project ARPANET (Advanced Research Projects [...]
Facebook Now Pays Hackers for Reporting Security Bugs in 3rd-Party Apps
Following a series of security mishaps and data abuse through its social media platform, Facebook today expanding its bug bounty program in a very unique [...]
Adobe Releases Out-of-Band Security Patches for 82 Flaws in Various Products
No, it's not a patch Tuesday.It's the third Tuesday of the month, and as The Hacker News shared an early heads-up late last week on Twitter, [...]
Apple Under Fire Over Sending Some Users Browsing Data to China's Tencent
Do you know Apple is sending iOS web browsing data of some of its users to Chinese Internet company Tencent?I am sure many of you are not aware of this, [...]
Firefox Blocks Inline and Eval JavaScript on Internal Pages to Prevent Injection Attacks
In an effort to mitigate a large class of potential cross-site scripting issues in Firefox, Mozilla has blocked execution of all inline scripts and potentially [...]
Report to Your Management with the Definitive 'Incident Response for Management' Presentation Template
Security incidents occur. It's not a matter of 'if' but of 'when.' There are security products and procedures that were implemented [...]
SIM Cards in 29 Countries Vulnerable to Remote Simjacker Attacks
Until now, I'm sure you all might have heard of the SimJacker vulnerability disclosed exactly a month ago that affects a wide range of SIM cards and [...]
UNIX Co-Founder Ken Thompson's BSD Password Has Finally Been Cracked
A 39-year-old login password of Ken Thompson, the co-creator of the UNIX operating system among, has finally been cracked that belongs to a BSD-based [...]
Apple iTunes and iCloud for Windows 0-Day Exploited in Ransomware Attacks
Watch out Windows users!The cybercriminal group behind BitPaymer and iEncrypt ransomware attacks has been found exploiting a zero-day vulnerability affecting [...]
New Comic Videos Take CISO/Security Vendor Relationship to the Extreme
Today's CISOs operate in an overly intensive environment.As the ones who are tasked with the unenviable accountability for failed protection and [...]
7-Year-Old Critical RCE Flaw Found in Popular iTerm2 macOS Terminal App
A 7-year-old critical remote code execution vulnerability has been discovered in iTerm2 macOS terminal emulator app—one of the most popular open source [...]