Hot news

Netflix phishing

Phishing Campaign Targeting Your Netflix Account ask for Login Details, Credit card and Photo...

Phishing is one of the most common problems for Internet Users, hackers find a new innovative method to create believable URL’s to trick users....
BitTorrent

Critical Flaw in Popular BitTorrent Transmission Client Leads to an Attacker Perform Remote Hack...

A critical flaw discovered in BitTorrent Transmission client app that allows an attacker can remotely control the victims PC by using a method called...
Malicious Chrome Extensions

Four Malicious Chrome Extensions Impacted More than Half a Million Users

Security researchers from Cybersecurity firm ICEBRG detected four malicious chrome extensions that impacted more than half a million people. The initial investigation started after they...
Network Penetration Testing

SPARTA – Network Penetration Testing GUI Toolkit

SPARTA is GUI application developed with python and inbuild Network Penetration Testing  Kali Linux tool. It simplifies scanning and enumeration phase with faster results. Best thing...
Smoke Loader

Beware of Fake Spectre and Meltdown Patches Pushing Malware – Smoke Loader

Crooks trying to take advantage of the infamous bug Meltdown and Spectre which affects almost all the modern processors and pushes Smoke Loader malware...
FakeBank Malware

FakeBank Malware Layered Obfuscation Technique Replace a Default SMS App to Stealing Highly Sensitive...

A New persistent malware family called FakeBank spreading across Russian speaking nations and targetting Russian banks with sophisticated Obfuscation technique to steal highly sensitive...
Become Master in Cyber Security

Become Master in Cyber Security with Complete Advance Level Security Course Bundle

Cyber Attacks are evolving with more sophisticated and stealthy Techniques to compromise the Organization as well as individuals. To Prevent such cyber attacks as...
Fappening

Fourth Fappening – Hacker Pleads Guilty to Hacking into iCloud accounts of Celebrities

Fourth Fappening Hacker George Garofano,26 plead guilty in Federal court for computer hacking offense and the 26-year-old is going to face a maximum sentence...
lenovo backdoor

Lenovo Discovered a Backdoor in Network Switches Which Allows Attacker Could Perform DDOS

Lenovo discovered a backdoor in network switches that powered by Enterprise Network Operating System firmware during the security audit by Lenovo in the Telnet...
Backdoor

JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript

JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the server and the target...
Cain and Abel

Man in the Middle Attack with “Cain and Abel” Tool

Active eavesdropping alters the communication between two parties who believe they are directly communicating with each other. A man-in-the-middle attack allows a malicious actor to...

SafeHats : Bug Bounty ProgramGBHackers

NewsLetter

Signup to get Hacking News & Tutorials to your Inbox

Support Us

45,204FansLike
12,690FollowersFollow
2,178FollowersFollow

Most Popular

Recent News