GBH
GBH
Winnti APT Hackers

Winnti APT Hackers Attack Linux Servers With New Malware ‘Mélofée’

0
The discovery of a novel malware piece targeting Linux servers has been attributed to an unknown Chinese state-sponsored hacking group. ExaTrack, a French security firm,...
Chinese HackerscKEYPLUG Backdoor

Chinese Hackers Using KEYPLUG Backdoor to Attack Windows & Linux Systems

0
It has been reported by the Recorded Future’s Insikt Group that RedGolf, a Chinese state-sponsored threat actor group, was using a backdoor designed especially...
ChatGPT Ready to Write Ransomware

ChatGPT Ready to Write Ransomware But Failed to Go Deep 

0
Our lives are now enriched by the availability of LLMs that are easily accessible on the internet, so we have tools such as the...
Spyware Vendors Exploit 0-Days

Spyware Vendors Exploit 0-Days On Android and iOS Devices

0
The Threat Analysis Group (TAG) of Google unveiled recently that commercial spyware vendors targeted Android and iOS devices using zero-day vulnerabilities patched last year. In...
New WiFi Flaw

New WiFi Flaw Let Attackers Hijack Network Traffic

0
A fundamental security issue in the design of the IEEE 802.11 WiFi protocol standard, according to a technical study written by Domien Schepers, Aanjhan...
USB Drive

A Military-Type Explosive Sent Via USB Drive to Detonate When Plug-in To Computer

0
The Ecuadorian free-to-air television network Ecuavisa recently reported that a USB device was detonated inside an organization's newsroom. The explosion occurred due to a...
Fake DDoS-For-Hire Websites

UK Police Setup Thousands of  Fake DDoS-For-Hire Websites

0
The National Crime Agency (NCA) of the United Kingdom revealed that it had built several fake DDoS-for-hire service websites to track down cybercriminals who use...
Twitter's Source Code Leaked

Parts of Twitter’s Source Code Leaked Online On GitHub

0
Recently, Twitter has acknowledged that some of its confidential source code has been exposed on the popular coding platform GitHub. To address this issue, Twitter...
Pwn2Own Vancouver

Hackers Earned $1,035,000 for Exploiting 27 Zero-Days at Pwn2Own Vancouver

0
After the finale of Pwn2Own Vancouver 2023, the Masters of Pwn, Synacktiv (@Synacktiv), received $1,035,000 (plus a car) for their amazing achievements and hard...
Microsoft Outlook Vulnerability

Hackers Exploited Critical Microsoft Outlook Vulnerability To Gain Exchange Server Access

0
In response to a recent vulnerability identified in Outlook, Microsoft recently published a proper guide for its customers to help them discover the associated...

Complete Free Website Security Check

Website
Active Directory Penetration Testing Checklist

Active Directory Penetration Testing Checklist – 2023

3
This article covers Active directory penetration testing that can help for penetration testers and security experts who want to secure their network. "Active Directory...
Best SIEM Tools List

Best SIEM Tools List For SOC Team – 2023

0
What is SIEM? A security information and event management (SIEM) system is the foundation of security processes in the modern security operations center (SOC). A SIEM...
Top 10 Best Penetration Testing Companies – 2023

Top 12 Best Penetration Testing Companies & Services – 2023

0
Penetration Testing Companies are pillars when it comes to information security, nothing is more important than ensuring your systems and data are safe from...

Kali Linux 2022.4 Released – What’s New!!

0
Offensive Security released a new version of its Penetration testing distro Kali Linux 2022.4, with several new features, hacking Tools, Kali NetHunter pro versions,...
Wireshark 4.0.1 Released – What’s New!!

Wireshark 4.0.1 Released – What’s New!!

0
A new version of Wireshark has been released recently by the Wireshark Team, it's Wireshark 4.0.1, which contains several enhancements, new updates, and bug...
How To Select Your Pentest Vendor: Guide

How To Select Your Pentest Vendor: Guide

0
Systematic Penetration Testing is the only way to be a step ahead of hackers, so it is worth spending money on. But there are...
A Complete Guide to Perform External Penetration Testing on Your Client Network | Step-by-Step Methods

A Complete Guide to Perform External Penetration Testing on Your Client Network | Step-by-Step...

0
This write-up walks us through one of my many journeys in my external penetration testing and how I compromised the organization in this write-up. After...
Top 5 Penetration Testing

What Are The Top 5 Penetration Testing Techniques?

0
Before you start reading this topic, you need to know what are penetration tests all about? This is also known as pen test which...
Top Free Cybersecurity Tools 2021

Top Free Cybersecurity Tools 2021

0
Whether you’re a large business organization, a small startup, or an individual working from home, cybersecurity tools are equally essential for you. Of course...
Millions of Routers are Actively Exploited Through Bypasses Authentication Bug

Millions of Routers are Actively Exploited Through Bypasses Authentication Bug

0
The security researcher at the information security company Tenable Evan Grant detected that a serious security violation puts millions of routers at risk all...

Popular Categories

Infosec Resources