Hot news

DNS Rebinding Attack

Half a Billion Enterprise IoT Devices are Vulnerable to DNS Rebinding Attack – A...

A new researcher revealed that Half a Billion home and enterprise based devices IoT Devices are vulnerable to DNS Rebinding Attack including IP phones, printers,...
Raspberry Pi and Kali Linux

Building a Hacking Kit with Raspberry Pi and Kali Linux

The Raspberry Pi has some unique features that are very powerful and easily accessible for a Hacking Kit. In particular, Pi is a joke...
massive Data Breach

Massive Data Breach – Hackers Stolen More than 1.5 Million Patients Personal Details

SingHealth suffers a massive Data Breach, hackers exfiltrated the database that contains 1.5 million patients records from 1 May 2015 to 4 July 2018. The...
CxO

Most Difficult Security Challenges for CxO (Chief x Officers) During the Cyber Attack

New Technologies are evolving rapidly nowadays and cybercriminals also traveling, in the same way, to increase the cyber risk factor to the organization as...
Cybercrime tactics

Top Cybercrime Tactics and Techniques Q2 2018 Cryptomining, GrandCrab, SamSam & VPNFilter

Malwarebytes published reports on Cybercrime tactics and techniques shows the new developments in ransomware and cryptomining attacks. When compared to Q1 the Q2 attacks...

Security Information and Event Management (SIEM) – A Detailed Explanation

SIEM software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by...

Thousands of US Voters Personal Data Leaked Online Again

Thousands of US voters personal details exposed online again form misconfigured Amazon S3 bucket and the data appears to be a part of Robocent,...
Navi Mumbai Hospital

Hackers Compromised Navi Mumbai Hospital Computers Sytems With Ransomware

Ransomware attack hits computer systems of Navi Mumbai Mahatma Gandhi Mission Hospital. The attack came into light on Sunday when a receptionist switched on...
Cisco Released Critical Security Updates

Cisco Released Critical Security Updates for Vulnerabilities that Affected Cisco Products

Cisco Released critical Security Updates for many of its product where they addressed 27 new vulnerabilities which categorized under Critical, High and Medium. Some of...
Identity Bounty program

Microsoft Launches Identity Bounty program That Rewards Up to $100,000

Microsoft launches Identity Bounty program that offers bug bounty hunters up to $100,000. For security researchers who discover a security vulnerability in the Identity...
Labcorp Security Breach

LabCorp Security Breach Puts Millions of Patient Records at Risk

LabCorp Security Breach puts millions of patient records at risk, LabCorp serves more than 115 million patient annually. On July 14th hackers got access...
Advanced Backdoor

Most Advanced Backdoor Obfuscation and Evasion Technique That used by Hackers

Cybercriminals are using the most sophisticated techniques to bypass the security controls in a various organization such as  IT, medical, manufacturing industries, energy sectors,...
Oracle Patch Update

Oracle Releases Critical Patch Update that Covers 334 Vulnerabilities Across All the Products

Oracle Releases Critical Patch Updates that contains security fixes for 334 products across all the families. The Oracle Patch Update covers products including Oracle Database...
Blackgear Cyberespionage

Blackgear Cyberespionage Abuses Blogging and Social Media Services To Evade Detection

Blackgear Cyberespionage campaign is active at least from 2008, the threat actors behind the campaign use various malware tools such as the Protux and...

Support Us

49,567FansLike
18,690FollowersFollow
2,629FollowersFollow

NewsLetter

Sign up to get Hacking News & Tutorials to your Inbox along with 24k Readers 

            Android Parental Control

Most Popular

Recent News