Latest
Winnti APT Hackers Attack Linux Servers With New Malware ‘Mélofée’
The discovery of a novel malware piece targeting Linux servers has been attributed to an unknown Chinese state-sponsored hacking group.
ExaTrack, a French security firm,...
Chinese Hackers Using KEYPLUG Backdoor to Attack Windows & Linux Systems
It has been reported by the Recorded Future’s Insikt Group that RedGolf, a Chinese state-sponsored threat actor group, was using a backdoor designed especially...
ChatGPT Ready to Write Ransomware But Failed to Go Deep
Our lives are now enriched by the availability of LLMs that are easily accessible on the internet, so we have tools such as the...
Spyware Vendors Exploit 0-Days On Android and iOS Devices
The Threat Analysis Group (TAG) of Google unveiled recently that commercial spyware vendors targeted Android and iOS devices using zero-day vulnerabilities patched last year.
In...
New WiFi Flaw Let Attackers Hijack Network Traffic
A fundamental security issue in the design of the IEEE 802.11 WiFi protocol standard, according to a technical study written by Domien Schepers, Aanjhan...
A Military-Type Explosive Sent Via USB Drive to Detonate When Plug-in To Computer
The Ecuadorian free-to-air television network Ecuavisa recently reported that a USB device was detonated inside an organization's newsroom. The explosion occurred due to a...
UK Police Setup Thousands of Fake DDoS-For-Hire Websites
The National Crime Agency (NCA) of the United Kingdom revealed that it had built several fake DDoS-for-hire service websites to track down cybercriminals who use...
Parts of Twitter’s Source Code Leaked Online On GitHub
Recently, Twitter has acknowledged that some of its confidential source code has been exposed on the popular coding platform GitHub.
To address this issue, Twitter...
Hackers Earned $1,035,000 for Exploiting 27 Zero-Days at Pwn2Own Vancouver
After the finale of Pwn2Own Vancouver 2023, the Masters of Pwn, Synacktiv (@Synacktiv), received $1,035,000 (plus a car) for their amazing achievements and hard...
Hackers Exploited Critical Microsoft Outlook Vulnerability To Gain Exchange Server Access
In response to a recent vulnerability identified in Outlook, Microsoft recently published a proper guide for its customers to help them discover the associated...
Active Directory Penetration Testing Checklist – 2023
This article covers Active directory penetration testing that can help for penetration testers and security experts who want to secure their network.
"Active Directory...
Best SIEM Tools List For SOC Team – 2023
What is SIEM?
A security information and event management (SIEM) system is the foundation of security processes in the modern security operations center (SOC).
A SIEM...
Top 12 Best Penetration Testing Companies & Services – 2023
Penetration Testing Companies are pillars when it comes to information security, nothing is more important than ensuring your systems and data are safe from...
Kali Linux 2022.4 Released – What’s New!!
Offensive Security released a new version of its Penetration testing distro Kali Linux 2022.4, with several new features, hacking Tools, Kali NetHunter pro versions,...
Wireshark 4.0.1 Released – What’s New!!
A new version of Wireshark has been released recently by the Wireshark Team, it's Wireshark 4.0.1, which contains several enhancements, new updates, and bug...
How To Select Your Pentest Vendor: Guide
Systematic Penetration Testing is the only way to be a step ahead of hackers, so it is worth spending money on. But there are...
A Complete Guide to Perform External Penetration Testing on Your Client Network | Step-by-Step...
This write-up walks us through one of my many journeys in my external penetration testing and how I compromised the organization in this write-up.
After...
What Are The Top 5 Penetration Testing Techniques?
Before you start reading this topic, you need to know what are penetration tests all about? This is also known as pen test which...
Top Free Cybersecurity Tools 2021
Whether you’re a large business organization, a small startup, or an individual working from home, cybersecurity tools are equally essential for you. Of course...
Millions of Routers are Actively Exploited Through Bypasses Authentication Bug
The security researcher at the information security company Tenable Evan Grant detected that a serious security violation puts millions of routers at risk all...