Here's What to Do When Your Password Manager Gets Hacked
Can password managers get hacked? And if so, should you be worried? Here's what steps you need to take.
What Are Disassociation Attacks?
This tactic can mean your data ends up in the hands of cybercriminals. So what is a disassociation attack and how can you protect yourself?
Hackers Take Over Microsoft Exchange Servers with OAuth Apps
Malicious attackers are using rogue OAuth apps to gain control of Microsoft Exchange servers and spread spam.
What Is Wardriving? How to Protect Yourself
Wardriving is one of the risks you face when using public Wi-Fi, and your home network could be at risk too. Here is how to keep your data safe.
Crypto Market Maker Wintermute Loses $160 Million to Hackers
U.K-based cryptocurrency market maker Wintermute has lost over $160 million via a hack, according to the company's CEO.
The 7 Stages of Hacking Explained
How do cybercriminals find out who to hack? And how do they actually hack a system and steal data? Here's what you need to know.
Steam Accounts at Risk in New Browser-in-Browser Attack
Malicious actors are now using a new technique to get their hands on Steam account credentials.
What Are Threat Actors and What Do They Want?
You might have heard the term, "threat actor", but what does it mean? Why do they threaten your online security? And how can you protect against them?
11 Bluetooth Attacks You Need to Know About
No, even your Bluetooth connection isn't safe from hackers! Here's how cybercriminals can target your Bluetooth-enabled devices.
Hackers Exploit James Webb Telescope Image to Spread Malware
One of the stunning James Webb telescope images is now being used by malicious actors to spread malware among devices.
TikTok Denies Security Breach After Claims It Has Been Hacked [UPDATED]
TikTok has denied claims that it has suffered a massive data breach, though speculation is still running rife.
Everything You Need to Know About BlackArch Linux
BlackArch is a well-known penetration testing distribution based on Arch Linux, but not everyone is aware of the unique features that set it apart.
Kali Linux 2022.3 Released With Major Hacking Tool Upgrades
The developers have also announced a new Discord server. What will happen to their IRC channel?
Thousands of Solana Wallets Hacked and Drained in Multimillion Dollar Attack
Thousands of Solana wallets have been drained in an overnight exploit resulting in the theft of millions of dollars.
LockBit Ransomware Exploits Windows Defender to Load Cobalt Strike
A type of ransomware known as "LockBit 3.0" is being used to deploy Cobalt Strike payloads via the Windows Defender command line tool.
How Russian Hackers Use Google Drive and Dropbox to Evade Detection
Learn how threat actors exploit legitimate cloud services and what you can do about it.
What Is a Gray Hat Hacker?
You may have heard of black and white hat hackers, but what does a gray hat hacker do? Let's find out.
The FBI Warns Crypto Investors to Watch Out for Fraudulent Apps
The FBI is warning of fraudulent cryptocurrency apps that have stolen millions from investors.
Researchers Warn of a Dangerous Raspberry Robin Worm Targeting Windows Users
Windows users need to be aware of a Raspberry Robin worm being spread via USB devices.
What Is the Lazarus Group? Is It Really Comprised of North Korean Hackers?
Suspected to be funded by the North Korean government, the Lazarus Group poses a threat to the whole world.