Hot news

Business Phishing Campaign

Active Business Phishing Campaign Targeting Fortune 500 Companies to Steal Financial Assets

Hackers involved in Business Phishing Campaign using well crafted social engineering methods to harvest login credentials and to steal money. The attack most likely to...
VBA Macro

Hackers Distributing Malicious RTF Excel Sheets Document and Installing RAT using VBA Macro code

A recently discovered RTF documents that contain malicious VBA Macro code distributing to infect the windows users with dangerous Remote access Trojan ( RAT...
Tempting Cedar Spyware

Beware!! Hackers Using Facebook Profiles to Trick the User’s in Downloading Android Spyware

Hackers using attractive fake Facebook profiles to trick the users into downloading Android Tempting Cedar Spyware that can steal pieces of information like contacts,...
Proxy Server

Mirai Based Botnet “OMG” Turns IoT Device into a Proxy Server

A new Variant called "OMG" currently evolving to abuse the IoT Devices and turns it into a Proxy server by adding new techniques that...
Facebook vulnerability

Facebook Vulnerability May Allow an Attacker to Perform Phishing Attack

The Facebook vulnerability may allow attackers to create a phishing attack through the trusted domain. The Vulnerability resides in validating the contents of the...
Cryptojacking

Wikipedia Page Linked with “Minr” Cryptojacking Malware Infected 3rd Party Website

Cryptojacking Malware called "Minr" infected website has been linked with Wikipedia Page that leads to mine the cryptocurrency Monero (XMR). Wikipedia visitors who visiting the concern...
microcode updates

Security Update – Intel released Spectre patches for Kaby Lake, Coffee Lake, Skylake Platforms

Intel released microcode updates to address Spectre vulnerability(CVE-2017-5715) for many of its chipsets including the recently announced Intel® Xeon® Scalable and Intel® Xeon® D...
Cryptocurrency Mining script

Hackers Spreading Cryptocurrency Mining scripts via videos that Embedded in MS Office Word Documents

Microsoft word documents abused by Cryptocurrency Mining script embedded phishing Videos and victims tricked into watching an "innocent" video that leads to performing a crypto-Jacking Attack...
Indian Telugu Character

Now Fix Available for Indian Telugu Character that Crashes Apple Devices

Last week the text bomb bug came to light, that a single Indian Telugu Character that can crash applications on Apple iPhone, Mac or iPad....

Cryptojacking Attack – Tesla Internal Servers Hacked to Mine Cryptocurrency

Tesla internal servers compromised by hackers and exposed the sensitive data from Tesla’s Kubernetes console that has been used for performing the cryptojacking attack. Kubernetes is...
Masscan

Masscan – World’s Fastest Scanner – Scan the Entire Internet in Under 6 Minutes

Masscan - Worlds fastest scanner can scan the entire Internet in under 6 minutes, transmitting 10 million packets per second.  Masscan is an Internet-scale port...

SafeHats : Bug Bounty ProgramGBHackers

NewsLetter

Signup to get Hacking News & Tutorials to your Inbox

Support Us

46,823FansLike
12,690FollowersFollow
2,276FollowersFollow

Most Popular

Recent News