Hot news

Virtual private network: what is it and why do you need it?

Computers and the Internet have become one of the main means of transmitting and processing information. Most of the information on the Internet is...
Trojan Embedded Game BlazBlue Downloaded by a Million Android Users

Trojan Embedded Game BlazBlue Downloaded by More than Million Android Users from PlayStore

Security experts from Dr.Web found malicious trojan embedded with popular game BlazBlue and it has been downloaded by Millions of users. Malicious application dubbed as...
Android Banking Trojan Steals Confidential Bank Customers Information

Dangerous Android Banking Trojan Control Mobile Devices and Steals Confidential Bank Customers Information

New Banking Trojan Discovered that named Android.BankBot.211.Origin controls the Mobile Devices and steals confidential bank customer information by using accessibility  services. This Banking Trojan forced...
Vulnerability Bad Taste Affects Linux Machine via Windows MSI Files

Vulnerability Bad Taste Affects Linux Machine via Windows MSI Files

Security Researcher Nils Dagsson Moskopp PoC shows that windows executables can infect Linux Systems. This Vulnerability(CVE-2017-11421) exists with the gnome-exe-thumbnailer version prior to 0.9.5. Moskopp...
Android Application Penetration Testing

Android Application Penetration Testing – Part 1

After web applications more concern area is mobile application penetration test Let’s start with some basics- Basic architecture for android device Linux kernel For hardware we always...
CIA Malware Development Surveillance Project

Vault 7 Leaks : CIA Owned PoC Malware Development Surveillance Projects “UCL Under Raytheon”...

WikiLeaks Revealed CIA Surveillance Projects Documents "UMBRAGE Component Library(UCL)"  from CIA contractor Raytheon Blackbird Technologies which contains five secret Malware Development Related PoC(Proof-of-Concepts) with...
SambaCry Vulnerability Deploying Payloads Targeting IoT devices

SambaCry Vulnerability used in Deploying Payloads Targeting IoT devices Particularly NAS

Attackers using the SambaCry vulnerability to target older versions of Samba(3.5.0) to upload and execute the malicious payload. SambaCry Vulnerability(CVE-2017-7494) have the similarities of...
Millions of IoT Devices Infected with “Devil’s Ivy” RCE vulnerability

Millions of IoT Devices Infected with “Devil’s Ivy” Remote Code Execution Vulnerability Including Internet...

A New Vulnerability called  “Devil’s Ivy” Discovered that infected Tens of Millions of IoT Devices which leads to Remotely Execute the code in IoT's...

CoinDash Suffered a Hacking Attack And Stolen $7 Million Worth Ethereum Cryptocurrency

CoinDash Website has been hacked by unknown hackers during our Token Sale event which leads to $7 million worth of Ethereum was stolen in about half...

Android Application Penetration Testing Part 6

Let the fun begins. As per Owasp, Vulnerabilities has been categorized as TOP 10. https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10 M1 - Improper Platform Usage            ...

GBHackers On Security || Lands into Top 100 Information Security Blogs in the Planet

Support Us

11,576FansLike
5,874FollowersFollow
1,627FollowersFollow

Most Popular

Recent News

Permanent Denial-of-Service attack with IOT devices-BrickerBot

PDoS is an attack that harms a system so severely that it requires substitution or...

CBI registers FIR on PayTm’s customer for cheating

In limelight of various events at PayTm, digital wallet giant has accused 15 of its...

Another Biggest Ransomware “Petya” Attacked and Perform Massive Breach in Large Number of Countries Across the Globe – What to do if you are...

Again Ransomware Back to Form !!! A Ransomware called "Petya" Attack Large  Number of Countries...

Did your Gmail account signed out unexpectedly Today?What happened?

Prior today a huge number of Gmail accounts lockout the users and they were asked...

These were the biggest Cyber Attacks of the year 2016

This was the year when many historical hacks came back to bite millions just as...

Malicious payload Evasion Techniques

Security researchers from iSwatlab provided a description and a comparison of a few strategies for the...

WordPress Download Manager Plugin Vulnerable to Cross Site Scripting attack

Reflected XSS vulnerability found in the  WordPress Download Manager opens the gate for Hackers and...

Russia Demands Google and Apple to Remove Linkedin From Local App stores

The New York Times reports that Russia has forced Apple and Google to remove the...

Penetration testing Android Application checklist

Android is the biggest organized base of any mobile platform and developing fast—every day. Besides,...

Critical Vulnerability with NETGEAR WNR2000 Discloses admin credentials

Critical Vulnerability with NETGEAR WNR2000 was disclosed by security experts from Agile Information Security. SUMMARY NETGEAR WNR2000 permits...

WhatsApp iPhone Users Can Queue Messages Without Internet and More

WhatsApp for iPhone has received an update which included many needed features for users. Recent...

Very Severe Cyclone Vardah : Slows down Internet Connection in India

Cyclone Vardah  which hits Chennai severely, has unleashed a Wreaked havoc and severe destruction all around....

A Fileless Ransomware Called “SOREBRECT” Discovered with Code Injection Capability that Encrypts local and Network Share Files

A  Fileless Ransomware "SOREBRECT"  Discovered that have the capability to inject the Malicious code into...

The new Linux/Rakos, malware threatening devices and servers under SSH scan (Again)

New linux Malware, dubbed Linux/Rakos is threatening devices and servers.The malware is written in the Go...

Intrusion Detection System (IDS) and Its detailed Function – SOC/SIEM

What does Intrusion Detection System (IDS) mean? An intrusion detection system (IDS) is a type of...