Hot news

PuTTY 0.71

PuTTY 0.71 Released – SSH Client Updated To Fix a Large Number of Security...

The free and open-source SSH client updated with the fix for a number of Security Vulnerabilities including the one in RSA key...
njRAT Backdoor

APT-C-27 Hackers Launching njRAT Backdoor via Weaponized Word Documents to Control the Compromised Device

Goldmouse APT group (APT-C-27) now start exploiting the WinRAR vulnerability (CVE-2018-20250) to hide the njRAT backdoor and targeting users reside in the...
Extensive Ransomware Attack

Extensive Ransomware Attack Hits Worldwide Operation at Aluminum Manufacturing Gaint Norsk Hydro

Extensive Ransomware Attack forced to shut down operations at, Norsk Hydro, one of the world’s largest aluminum producers. The company suffered production...
JNEC.a Ransomware

Alert !! Hackers Launching New JNEC.a Ransomware via WinRAR Exploits – Do not Pay

A brand new JNEC.a ransomware spreading via recently discovered WinRAR vulnerability exploit to compromise windows computer & demand the ransom amount.
Yuki Chan

Yuki Chan – Automated Penetration Testing and Auditing Tool – Detailed Explanation

Yuki Chan is an Automated  Penetration Testing tool that will be auditing all standard security assessment for you.It is one of the Best Penetration testing...
Mirai Malware

New Mirai Malware Attack on Enterprise Wireless Presentation systems and Supersign TVs

Mirai malware is a powerful strain that compromises a number of Linux devices and uses those devices to launch a massive distributed...

New Top 10 Best Android Antivirus Apps of 2019 -100 % Mobile Protection

Choosing the Best Android Antivirus app is the most important concern to protect your Andriod device from sophisticated cyber threats. Antivirus plays...
Chinese Government

Gandcrab Ransomware Attack on Chinese Government Internal Network

Hackers launched ransomware attacks on Chinese Government department and infected their internal computer network to lock the file and demand the ransom.
IMAP

Hackers Bypass Multi-factor Authentication to Hack Office 365 & G Suite Cloud Accounts Using...

attackers targeting legacy protocols with stolen credential dumps to increase the speed and efficiency of the brute force attacks.
Counter-Strike vulnerabilities

Zero-Day Flaws in Counter-Strike 1.6 Exploited by Malicious Servers to Hack Players Computer

Hackers exploiting zero-day vulnerabilities in Counter-Strike 1.6 game client to infect player's devices by using a malicious gaming server and downloads malware...
Powload Malware

Hackers using steganography to Drop the Powload Malware & Hide Their Malvertising Traffic

Cyber criminals now approaching a unique way to spread Powload malware with the help of steganography to infect the targeted system.
DNS

What is DNS Attack and How Does it Work?

DNS Attack is a type of cyber attack that exploit the weakness or vulnerability in Domain name system. Today, the internet has turned into...

Support Us

49,844FansLike
18,690FollowersFollow
2,629FollowersFollow

NewsLetter

Sign up to get Hacking News & Tutorials to your Inbox along with 24k Readers 

Most Popular

Recent News