Leading cryptocurrency platform Crypto.com has finally admitted that 483 users on its platform lost almost $34 mn in various digital coins owing to a compromise in two-factor (2FA) authentication.
The CEO of cryptocurrency exchange crypto.com, a cryptocurrency platform endorsed by famous Hollywood actor Matt Damon, has confirmed that hundreds of user accounts were hacked and their funds stolen.
Victims of a $200 million hack of popular cryptocurrency exchange BitMart are still waiting for their money even after over a month since the exchange was hacked.
The software is used to record all manner of activities that go on under the hood in a wide range of computer systems
Some of the world's largest technology companies are still struggling to make their products safe from a gaping vulnerability in common logging software a week after hackers began trying to exploit it
The US on Monday revealed a new software vulnerability and warned that hundreds of millions of devices are at risk.
They said cyber security was as important as border and internal security and asked whether the Aadhaar data of all Indians was safe
A critical vulnerability in a widely used software tool one quickly exploited in the online game Minecraft is rapidly emerging as a major threat to organisations around the world. The internet's on fire right now," said Adam Meyers, senior vice president of intelligence at the cybersecurity firm Crowdstrike. People are scrambling to patch, he said, "and all kinds of people scrambling to exploit it." He said on Friday morning that in the 12 hours since the bug's existence was disclosed that it had been "fully weaponised, meaning malefactors had developed and distributed tools to exploit it. The flaw may be the worst computer vulnerability discovered in years. It was uncovered in a utility that's ubiquitous in cloud servers and enterprise software used across industry and government. Unless it is fixed, it grants criminals, spies and programming novices alike easy access to internal networks where they can loot valuable data, plant malware, erase crucial information and much more.
Several popular services, including Apple iCloud, Amazon, Twitter, Cloudflare and Minecraft, are vulnerable to a 'ubiquitous' zero-day exploit, cybersecurity researchers have warned
Chinese hackers, likely state-sponsored, have been broadly targeting government and private-sector organisations across Southeast Asia, according to a report
Microsoft has disrupted a China-based hacking group that targeted organizations in the US and 28 other countries around the world
According to reports, someone inserted a malicious script in the user interface (UI) of their website
Spamhaus Project on Saturday (local time) confirmed that emails have been sent from a Federal Bureau of Investigation (FBI) server
Mexico had the largest list about 15,000 phone numbers among more than 50,000 reportedly selected by NSO clients for potential surveillance.
Ethical hackers abound in real life and in fiction. But, what exactly is ethical hacking? How is it different from the other hacking we are hear about generally? Let's delve deeper into the subject
Many commodities that can be purchased in the dark markets are inexpensive, making attacks cheaper and easier to conduct
Microsoft says group targeted over 150 American and foreign organisations using USAid account
Google has said that so far in 2021, it has sent over 50,000 warnings to those whose accounts were the target of government-backed phishing or malware attempts
Cyber-attacks have cost SMBs more than Rs 3.5 cr to Rs 7 cr in the last 12 months
Any allegations should be supported by "complete and adequate" evidence, the foreign ministry said, adding that it firmly opposes any form of cyberattacks