Some hackers verify themselves as owners for the websites they compromise in the Google Search Console.
Hackers gained access to over 10 million customer records from U.S. health insurer Excellus BlueCross BlueShield.
A team of password cracking experts found flaws in the Ashley Madison code that allowed them to recover 11.2 million passwords from data leaked by hackers.
The Turla cyberespionage group is hijacking satellite-based Internet connections in order to hide servers from security researchers and law enforcement agencies.
Microsoft fixed a previously unreported vulnerability discovered in the cache of files leaked from Italian surveillance company Hacking Team in July.
A group of hackers that have been targeting military and government organizations from NATO countries have borrowed code from a leaked online banking Trojan.
The Ashley Madison developers stored sensitive credentials like database passwords, AWS API secrets, authentication tokens and SSL private keys in their source code repositories.
Kaspersky Lab has released an emergency patch for some of its antivirus products after a security researcher found a critical vulnerability that could allow hackers to compromise computers.
A LinkedIn-based intelligence gathering campaign has been using fake LinkedIn profiles to map out the professional networks of IT security experts.
The Shopperz adware program uses a cunning technique to make DNS (Domain Name System) hijacking harder to detect and fix.
A security analysis of nine baby monitors from different manufacturers revealed serious vulnerabilities and design flaws that could allow hackers to hijack their video feeds or take full control of the devices.
The average company has more than one gambling application installed on some of its employees' mobile devices, and in some cases as many as 35.
The Belkin N600 DB wireless dual band router model has unpatched vulnerabilities that could allow hackers to compromise affected devices.
Malware that runs inside GPUs (graphics processing units) can be harder to detect, but is not completely invisible to security products.
The Linux Foundation published a list of security recommendations for hardening Linux workstations used by systems administrators.