Hot News

Windows Running MS-SQL Servers Under Attack!! Hackers Installing 10 Secret Backdoors on Servers

Windows Running MS-SQL Servers Under Attack!! Hackers Installing 10 Secret Backdoors on Servers

Researchers uncovered a massive attack on Windows running Microsoft SQL servers by a group of hackers using the new wave of long-running...
Critical Zoom Vulnerability Allows Hackers to Steal your Windows Password & Escalate Privileges with macOS

Critical Zoom Vulnerability Allows Hackers to Steal your Windows Password & Escalate Privileges with...

A critical vulnerability with the Zoom client for windows allows attackers to steal Windows login credentials. Zoom is...
LimeRAT Malware

Hackers Deliver LimeRAT Malware Using Password Protected Excel Spreadsheet’s

A new malware Campaign discovered using password-protected Microsoft Excel spreadsheets to deliver LimeRAT malware. Security researchers from Mimecast discovered...
WordPress Plugin

Critical RCE Bug in WordPress Plugin Let Hackers Gain Admin Access on 200,000 Websites

Researchers from Wordfence uncovered two RCE vulnerabilities in Wordpress SEO plugin called Rank Math let hackers hijack nearly 200,000 vulnerable Websites...
Hackers Spreading Zeus Sphinx Malware to Hijack Windows Process Using  Malformed MS Word Documents

Hackers Spreading Zeus Sphinx Malware to Hijack Windows Process Using Malformed MS Word...

Researchers uncovered a new malspam campaign through which cyber criminals launching Zeus Sphinx Malware via Coronavirus Lure Malformed MS documents.
video communication platforms

Hackers Using Zoom’s Popularity in Coronavirus Outbreak to Infect Computers With Malware

Cybercriminals continue to use the Coronavirus outbreak to launch various attacks such as malware, phishing, fraud, and disinformation campaigns.
DrayTek

Hackers Exploiting Two 0-Day Bugs in DrayTek Routers & Create A Backdoor in Enterprise...

Researchers observed two new hackers groups abusing two DrayTek Routers' zero-day vulnerabilities to exploit the enterprise network routers and perform a series...
Ways to Increase Strength Of Web Application Security

Top 10 Ways to Increase Strength Of Web Application Security

Web application security, one of the most significant components in the web app extension, frequently gets ignored. Within...
COVID-19 Pandemic

COVID-19 Pandemic – Beware of Fraudulent Websites Advertised Selling Face Masks

Cybercriminals continue to take advantage of the current coronavirus situation to launch various attacks such as malware, phishing, fraud, and disinformation campaigns.
Most Important Network  Penetration Testing Tools for Hackers and Security Professionals

Most Important Network Penetration Testing Tools for Hackers and Security Professionals

Network Security tools for Penetration testing is more often used by security industries to test the vulnerabilities in network and applications.
Poisoned News

Operation Poisoned News – Hackers Deliver Malware Targeting iOS Users Using Local News Links

A new campaign dubbed Operation Poisoned News that uses news local news sites links to deploy malware called lightSpy on the user's...

NewsLetter

          Sign up for Daily Updates 

                   

Cyber Security Courses

ethicalhackersacademy

Top Posts

Ethical Hacking Course

Learn Ethical Hacking Course Online
       up to 70% off [Lifetime access]

          SOC Analyst Training Online                up to 60% off [Lifetime access]

  Complete Malware Analysis Bundle           up to 85% off [Lifetime access]