Hot news

Ukraine Energy Ministry

Ransomware Attack Hits Ukraine’s Ministry of Energy Website and Demands Ransom of 0.1 Bitcoin

Hackers compromised the official website of Ukraine Energy Ministry and demanding a ransom of 0.1 in BTC that worths $927.86. It appears like the...
Privacy Policy

Privacy Policy – Sensitive Information that Collected by Websites and Mobile Applications

A privacy policy is a statement that discloses some of the ways a party gathers, uses, discloses, and manages a customer or client's data. While we install...
APT Group

APT Group Cyber Attack to Hack Various Companies Web Servers Using Advanced Hacking Tools

A Well known APT group called Energetic Bear/Crouching Yeti attacked various companies servers with a strong focus on energy and industrial sectors around the World. This cybercrime...

Sophisticated Cryptocurrency Mining RETADUP Worm Goes Polymorphic to Evade Detection by Security Scanners

A new variant of cryptocurrency mining RETADUP worm found shifted to AutoHotKey version an open source windows programming language that used for creating hotkeys. It allows...

APT Group Cyber Attack Against Medical Sectors to Hack X-Ray & MRI Scan Machines

New APT Cyber espionage group Orangeworm targeting healthcare sectors and other medical related industries to deploy the powerful Kwampirs backdoor to compromise the medical devices...

Best Ways to Prepare Your Organization For Cyber Disasters

As technology continues to develop, the nation and its businesses become more and more reliant on the internet. This has become an even more...
SunTrust bank

1.5 Million Customers Data Maybe Stolen by Ex-SunTrust Bank Employee

SunTrust Bank announced they become aware of a potential theft of up to 1.5 million clients records by a former employee and the exposed...

Most Important Industrial Control System (ICS) Security Resources and Tools for Security Professionals

Industrial Control System (ICS) are more often used by security industries to test the vulnerabilities in network and applications. Here you can find the...

5 PCI Compliance Standards CISO’s Care About the Most

The Payment Card Industry Data Security Standard (PCI DSS) is a defined standard that acknowledges a set of Policies and Procedures planned to enhance...
Foxit PDF reader

Multiple Arbitrary Code Execution Vulnerability in Foxit PDF Reader Affected and Earlier Versions

Multiple vulnerabilities reported in the Foxit PDF reader allows an attacker to execute the arbitrary code on the user's system and obtain sensitive information....
Ethical Hacking

Complete Ethical Hacking and Penetration Testing Course Bundle – Become a Professional Ethical Hacker

Today we want to introduce you to the “Complete Ethical Hacking and Penetration  Testing Course A to Z Bundle with 9 Amazing Hacking Courses”.There...

SafeHats : Bug Bounty ProgramGBHackers

Artificial Intelligence for Security Operations || StegoSOC


Sign up to get Hacking News & Tutorials to your Inbox

Join with 18k Readers Who receive Latest Cybersecurity Updates

Support Us


Most Popular

Recent News