Hot news

DDoS attacks

Why Virtually Everyone is Part of the Router Based Deadly DDoS Attack – Reason...

Every day, the vast majority of us do our best to not contribute to major global problems. We recycle. We bring our cars in...
Banking

Banking Malware posed as a Popular Social Media App to Steal Financial Data From...

Newly discovered Two Android Banking Trojan posed as popular social Media and banking apps to steal the victim's financial information from online banking and payment...
Rex Mundi

Europol Take Down the Oldest Rex Mundi Hacker Group

The Internet oldest hacker group Rex Mundi was taken down supported by the Europol and the Joint Cybercrime Action Taskforce (J-CAT). Rex Mundi hacker group...
Watering hole Attack

LuckyMouse Chinese APT Malware Launching Weaponized Waterholing Attack on Government Data Center

Chinese APT actor LuckyMouse also known as EmissaryPanda & APT27 campaign targeting government entities and national data center by inserting malicious scripts to compromise...
Threat Intelligence Tools

Most Important Cyber Threat Intelligence Tools List For Hackers and Security Professionals

Threat Intelligence Tools are more often used by security industries to test the vulnerabilities in network and applications. Here you can find the Comprehensive...

Android Application Penetration Testing – Part 6

Let the fun begins. As per Owasp, Vulnerabilities has been categorized as TOP 10. M1 - Improper Platform Usage            ...
Singapore

Russia Launch Heavy Cyber Attack on Singapore During Donald Trump & Kim Summit

Russia launches a rapid cyber attack on Singapore during President Donald Trump met with North Korean President Kim Jong-un in a Singapore hotel. Cyber attacks...
MuddyWater Malware

MuddyWater Malware Attack Launch PowerShell Script to Open Backdoor in Windows PC via MS...

Newly detected MuddyWater Malware campaign open the sophisticated backdoor in Windows PC by launching Powershell script using weaponized Microsoft word document. Initially, MuddyWater attack targeted the...
online Gambling

The Cyber Risk of Online Gambling websites – Are Casinos Safe?

For online Gambling house, data protection is not only an obligation but also a necessary measure to retain customers and earn more business. After all, who...
ClipboardWalletHijacker

300,000 Computers have been Hacked by CryptoMiner Hijacking Attack to Steal Bitcoin & Ethereum

Newly discovered activity wide-spreading crypto-miner called ClipboardWalletHijacker that attack over 300,000 victims Computer within a single week. This crypto-Mining Trojan mainly targeting the infected computers clipboard activities to...
Bypass Firewall

EgressBuster – Compromise Victim via Command & Control using Firewall

Network Firewalls acts as a fortification to keep the internal corporate network secure. Many people often think as it is protecting a device from...
drug vendor

Dark Web Drug Vendor Pleads Guilty After Federal Authorities Seized his Bitcoin Worth Nearly...

Gal Vallerius a 36-year-old Frenchman pleaded guilty in Miami federal court, he was a well-known drug vendor by his alias name "OxyMonster" on the...
MysteryBot Trojan

MysteryBot – Powerful Android Banking Trojan Launch Keylogger, Overlay & Ransomware in Single Attack

Newly Discovered Android-based MysteryBot Trojan launches various attack such as overlay, keylogger, and Ransomware in a single attack to perform various malicious activities. Based on...
Web Application Penetration Testing Checklist

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet

What is Web Application Penetration Testing? Web Application Pen testing is a method of identifying, analyzing and Report the vulnerabilities which is existing in the...

Support Us

49,726FansLike
18,690FollowersFollow
2,497FollowersFollow

NewsLetter

Sign up to get Hacking News & Tutorials to your Inbox along with 24k Readers 

            Android Parental Control

Most Popular

Recent News