Unlike most ransomware, Snatch also steals files on infected networks. The authors of Snatch ransomware use a novel trick to evade antivirus software and encry [...]
Read MoreUnlike most ransomware, Snatch also steals files on infected networks. The authors of Snatch ransomware use a novel trick to evade antivirus software and encry [...]
Read MoreDetected by the British company Fidus Information Security and revealed by TechCrunch, more than 752,000 copies of US birth certificates have been exposed on t [...]
Read MoreThe Ocean Lotus Hackers Group, aka APT32, has managed recently to penetrate the computer networks of BMW and Hyundai. The Vietnamese government also appears to [...]
Read MoreIn terms of Digital Forensic, there are many tools that can be used to extract valuable and sensitive information directly from the memory (RAM) of a computer/ [...]
Read MorePromon security researchers discovered a new flaw on Android smartphones, StrandHogg would make vulnerable all versions of the operating system of Google.
Read MoreMicrosoft has used a database of hacked IDs to identify users who reuse them without worrying about the risks involved. The US giant has identified 44 million [...]
Read MoreOpenBSD has fixed four vulnerabilities including privilege escalation vulnerabilities and a remotely exploitable authentication bypass. Qualys Research Labs re [...]
Read MoreFacebook would spy on our private conversations within its Messenger service, to better communicate them to companies buying advertising space. This is the the [...]
Read MoreThe researchers revealed a set of security vulnerabilities in Autodesk, Trend Micro and Kaspersky software. The problem stems from a bug in loading DLLs used b [...]
Read MoreMillions of SMS have been found in open access on the internet without password or encryption. This database is managed by Texas-based company TrueDialog, whic [...]
Read MoreThe largest social network in the world is removing every day, millions of fake accounts. Almost all of them are scanned from the platform before they could ev [...]
Read MoreThe banking data of Macy's American customers were siphoned for a week during the month of October. An attack that could cost a lot to Macy's, a week before Th [...]
Read MoreSecurity editor Palo Alto Networks has admitted a leak of personal data affecting 7 of its employees, current or former. Relations with one of its partners who [...]
Read MoreSecurity Research from ESET have found cyber criminals activity behind the Stantinko Botnet that were distributing Monero cryptominer malware via YouTube had c [...]
Read MoreAdobe disclosed today a security breach that impacted users registered on the company's Magento Marketplace, a portal for buying, selling, and downloading them [...]
Read MoreGoogle detected and alerted more than 12,000 of Its users who were threatening by the government backed hacking campaign in the third quarter of this year, as [...]
Read MoreLatest ransomware known as **DeathRansom** began with a shaky beginning, but has solved the issues now, starting to infect victims and encrypting their files. [...]
Read MoreAn internet hacking group is currently scanning for Docker platforms that have exposed API endpoints online. These scans are to enable the hacker group to send [...]
Read MoreWhatsApp security system is now in the public spotlight because of the increasingly widespread discovery of bugs in the instant messaging application in recent [...]
Read MoreTwitter and Facebook reported that millions of users may have their personal information stolen by malicious software concealed in third-party apps including, [...]
Read MoreTrend Micro security researchers have discovered thousands of Android applications that have been affected by the vulnerability in GIF processing that has rece [...]
Read MoreUS Telecom Giant T-Mobile Announced a privacy infringement on their network that gave hackers access to prepaid customer data. T-Mobile USA offers mobile voice [...]
Read MoreResearchers have discovered a total of 37 vulnerabilities affecting four open-source Virtual Network Computing (VNC) implementations, which have been around fo [...]
Read MoreWaterloo Brewery Ltd. claims that USD 2.1 million has been wasted to which the company has described as a social engineering cyberattack when the firm convince [...]
Read MoreThe Ransomware attack on the hospital in Rouen in France last week triggered extremely delays in patiencare & treatment. Medical personnel were forced to give [...]
Read MoreRussian Hacker Who Used NeverQuest Malware To thieve cash From victims’ bank accounts Sentenced In new york Federal court To 4 Years In jail. NeverQuest has be [...]
Read MoreDark web investigator Vinny Troia discovered one such cache lying uncovered and easily accessible on an unsecured server about 1.2 billion records of personal [...]
Read MoreThe Doppelpaymer ransomware that went around with companies this month was not spread through the BlueKeep vulnerability. Microsoft has debunked those rumors i [...]
Read MoreApple is modifying the testing process of new versions of its operating systems because of the many bugs in the release version of iOS 13, claims the financial [...]
Read MoreGoogle increases the maximum amount for its bugbounty program. Hackers can earn up to USD 1.5M for certain discoveries. This concerns bugs in the Titan M chip [...]
Read MoreWordPress website owners are advised to install the Jetpack 7.9.1 Critical Security Update to prevent potential attacks that may exploit a vulnerability that h [...]
Read MoreRecently, a malware named ACbackdoor has been discovered which infects both Windows and Linux based with capabilities of pretty complex operations which includ [...]
Read MoreA vulnerability within the Google Camera Application left many Google and Samsung smartphones receptive being probably abused potentially lease a malicious act [...]
Read MoreA new bug on Whatsapp, based on MP4 videos flaws, has been revealed by Facebook. This vulnerability could lead to denial of service attacks or remote code execution.
Read MoreA hacker, known as Phineas Fisher, has published more than 2TB of data from the Cayman National Bank. This includes more than 640,000 emails and the data of mo [...]
Read MoreSecurity researchers from Kryptowire has once again made a round-up of vulnerabilities present out of the box in Android phones. This concerns 146 CVE's on dev [...]
Read MoreThe Pipka script, recently discovered by researchers at Visa is capable of self-destructing after executing its code on a website, making it very difficult to [...]
Read MoreResearchers have discovered ransomware encoded in PureBasic, hence its name PureLocker. It is able to encrypt files on Windows, Linux, and Mac OS X and targets [...]
Read MoreAfter Spectre and Meltdown, another vulnerability affects Intel processors. A variant of the Zombieland attack would target chips under micro-architecture Casc [...]
Read MoreUniversity researchers have detailed the existence of 11 design flaws in 5G protocols exposing users to the risks of geolocation tracking, voice tracing and ei [...]
Read MoreBlueKeep is a security vulnerability that was discovered in Microsoft's Remote Desktop Protocol implementation of Windows 2008 R2 and Windows 7
Read MoreAi.type, a virtual keyboard for Android smartphones creates millions of fraudulent purchases without the users' knowledge.
Read MoreRing DoorBells and interphones of an Amazon subsidiary suffered a security breach. They could display, in plain text, the passwords of the home Wi-Fi networks.
Read MoreHack a voice assistant using lasers ! That's what Japanese researchers and the University of Michigan have done well on Alexa, Siri and Google Home assistants
Read MoreAppearing on a growing number of networks during May 2019, MegaCortex ransomware seems to have evolved. It can now change the password of the current user session.
Read MoreRecently one cybersecurity researcher discovered that the vulnerability BlueKeep was back and was used to install cryptominer remotely on compromised machines.
Read MoreA cybersecurity company has been able to acquire a large database of sensitive information from millions of Porn Cam Websites Internet users.
Read MoreEveris, one of the largest IT consulting companies in Spain, suffered a targeted ransomware attack on Monday, forcing the company to shut down all its computer [...]
Read MoreThe Nemty ransomware, initially detected in August 2019, has increased its reach by partnering up with the Trik botnet, which now delivers Nemty to compromised [...]
Read MoreFrom the beginning of November 2019, the reserves of classic IP addresses using IPv4 format will be missing. Another protocol called IPv6 should take over.
Read MoreThe French Center for Combating Digital Crime, with the help of Avast Researchers, was able to dismantle a vast botnet of 850,000 machines during a large-scale [...]
Read MoreApple has released an update that fixes the JailBreak security issue reopened by the iOS 12.4 update which could allow hackers to penetrate into malicious appl [...]
Read MoreCyber security researchers have discovered and analyzed a worm-cryptominer combo that uses a series of exploits to move sideways and compromise the devices o [...]
Read MoreA study shows that Google use thousands of “trackers” on pornographic sites. In theory, the information collected is anonymous, but most platforms are very poo [...]
Read MoreSecurity researchers have discovered a huge database of unsecured biometric informations including fingerprint data and facial recognition from more than 1 mil [...]
Read MoreRecent study shows that a hacker could weaken the encryption of Bluetooth devices and analyze communications or even send fake information to take control of t [...]
Read MoreAvailable for download on the Google Play Store for several years, a fake application targeting Samsung user was particularly popular. Except that it had absol [...]
Read MoreARP Poisoning, also known as ARP Spoofing is a technique by which an attacker sends spoofed Address Resolution Protocol messages onto a local area network.
Read MoreSome recent studies estimate that between 100 to 150 million computers worldwide would be directly infected by at least one malware such as Trojan or Keylogger.
Read MoreLinux is an extremely popular operating system for hackers. First of all, Linux's source code is freely available because it is an open-source Operating System (OS).
Read MoreIn networking, a ping sweep is a network scanning method that can establish a range of IPs which map to live hosts. The most used tool to run a ping sweeps is fping.
Read MoreHacking Tools are programs and scripts that help hackers and security researchers find and exploit weaknesses in computer systems, web applications, servers an [...]
Read MoreIf you want to immerse yourself more about how to hack with Android, then Termux is a very good App to use an discover.
Read MoreOne of the difficult part of writing and reading content about hacking and Cybersecurity is that it's a world full of jargon and technical terms.
Read MoreGhost Eye is an Information Gathering - Foot printing and Reconnaissance Tool made in Python 3. It includes some important tools for Information Gathering.
Read MoreIn this article we will try to cover the most useful Linux commands that every hackers, pentesters and experts in cybersecurity must know !!
Read MoreThe concept of “Google Hacking” dates back to 2002, when Johnny Long began to collect Google search queries that uncovered vulnerable systems and sensitive inf [...]
Read MoreNot all hackers are bad. There are good hackers called "white-hat" which use them skills to improve system security or either computer antivirus software companies.
Read MoreIn general, most people will tend to set passwords that are easy to remember, such as a birthday, a first-name or last-name, a license plate or a phone number.
Read MoreNmap has a lot of features, and one of them is a built-in script interpreter called NSE Nmap Scripting Engine. Nmap is the most used and best port scanning too [...]
Read MoreThe Jakarta Multipart Parser in Apache Struts 2 has incorrect exception handling and error-message generation during file-upload attempts.
Read MoreShodan Eye collects and return all information about every devices that are directly connected to the internet and according to the keywords your entered.
Read MoreVirtualBox is a powerful virtualization product and it is also the only professional solution that is freely available as Open Source Software.
Read MoreA recent study from July 2019 shows that the security vulnerability called ShellShock CVE-2014-6271 discovered in 2014 would still be present on a large number [...]
Read MoreDo you know that while you are browsing a website, you are mostly tracked by third parties who compile detailed records of your browsing behaviors.
Read MoreEnumeration is a process where the attacker establishes an active connection with the victim and try to discover as much attack vectors as possible.
Read MoreModern web browsers offer us a wide choice of options and features. But you may not know that it is possible to install extensions that will allow to do much more.
Read MoreGoogle Chrome is the most used web browser in the world. It is fast, intuitive, easy to use and secure browser built for the modern web.
Read MoreDNS poisoning, also referred to as DNS cache spoofing, is a form of computer security hacking in which corrupt DNS data is introduced into the DNS resolver's cache.
Read MoreA MITM attack is an attack where the attacker secretly relays and possibly alters the communication between two parties that are directly communicating with ea [...]
Read MoreThe term OS fingerprinting in Ethical Hacking refers to any method used to determine what operating system is running on a remote computer.
Read MoreFootprinting is a part of reconnaissance process which is used for gathering possible information about a target computer system or network.
Read MoreNowadays, hackers are more cunning than ever, and shine with ingenuity in crafting schemes to steal your data or even take possession of your computer or smartphone.
Read MoreThis SQLmap tutorial aims to present the most important functionalities of this popular SQL injection tool in a quick and simple way.
Read MoreSQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements that control a web application’s database server.
Read MoreHow do I find my public IP address on the Linux and OS X Unix using my own bash shell script ? Is there command-line option which will show my dynamic IP ?
Read MoreHow to hide your IP ? Tor is one of the best available network to protect your identity. Its considered safe because of its highly cryptographic data transfer [...]
Read MoreThis tutorial covers the installation of Metasploit Framework on Ubuntu Linux LTS. If you do not wish to run the Open Source version or set up a development en [...]
Read MoreResearchers estimate thousands of ecommerce sites are under attack by a single threat actor that has infected servers with a web-based keylogger.
Read MoreNmap is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine also against [...]
Read MoreIf you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you’ll probably want to establish an interac [...]
Read MoreBe able to bypass Antivirus can be very useful while penetration testing phases. Msfvenom allow you to generate shellcode that work with encrypted payloads.
Read MoreAs an Ethical Hacker, you will be using “Kali Distribution” or “Parrot” which has the Metasploit community version embedded in it along with other ethical hack [...]
Read MoreOften one of the most useful and to the beginner underrated abilities of Metasploit is the msfpayload module. Multiple payloads can be created with this module.
Read More