Home News


News from the cyber security world and abroad. Enjoy current affairs of the cyber underground and more. Browse popular news articles covering hackers and cybercrimnals alike. Discover new vulnerabilities and emerging threats that we cover. Looking for Malware or data breach related articles? Than the cyber post has all the cybersecurity information you can take in!

In addition to current affairs, we like to educate our readers. For instance, we have a learning section. Head over to our educational section and enjoy. Read some great tips and articles for securing your accounts and data. Protect yourself from phishing and basic password vulnerabilities. Looking for something more exciting to read? Than maybe some darknet stories will tickle your fancy. But sit back and enjoy exciting cybercrime stories from the darkweb. Learn of arrests and the data that carders and fraudsters peddle in.

StrandHogg 2.0 – Android Flaw Leaves 1 Billion Devices Vulnerable to Application Hijacking

A security vulnerability affecting Android that malicious apps can exploit to masquerade as any other app installed on a targeted device to display fake interfaces to the users, tricking...

ZOOM Zero-Day Vulnerability Allows Remote Code Execution

A zero-day vulnerability in Zoom for Windows may be exploited by an attacker to execute arbitrary code on a victim’s computer. The attack doesn’t trigger a security...

Russian Military Hackers Sandworm Exploiting Mail Software Says NSA

By Sergiu Gatlan The U.S. National Security Agency (NSA) says that Russian military threat actors known as Sandworm Team have been exploiting a...

A New RAT That is Controlled Via HTTP Status Commands

A new version of COMpfun remote access trojan (RAT) has been discovered in the wild that uses HTTP status codes to control...

Billions of Thai Internet Records Leaked

Over 8 billion real-time Internet records of users of Thailand’s largest cell network, Advanced Info Service (AIS), were leaked due to a misconfigured Elasticsearch database. 

The FBI, DHS & CISA Top 10 Most Exploited Vulnerabilities

Two US cyber-security agencies published this week a list of the top 10 most commonly exploited software vulnerabilities across the last four years,...

APT Gamaredon Using New Hacking Tools For Microsoft Outlook, Excel & Office

Gamaredon Hackers Using New Tools for Microsoft Outlook, Office, and Excel A Russia-linked APT group named Gamaredon (aka Primitive Bear) has been using...

CIA Gets presidential Go Ahead From Trump For More Covert Cyber Operations

In 2018, US President Trump gave the CIA more powers to carry out covert cyber operations resulting in several hacks and data dumps from Iranian and Russian...

New Malware Poisons NetBean Java Projects Github Warns

GitHub has issued a security alert on Thursday warning about a new malware strain that's been spreading on its site via boobytrapped Java projects.

IoT Security, Attacks And The Industrial Systems at Risk

Hackers could target smart manufacturing and other industrial environments with new and unconventional cyber attacks designed to exploit vulnerabilities in ecosystems which are supporting the Industrial Internet of...