Hot news

WSH Remote Access Tool

Hackers Delivering WSH Remote Access Tool (RAT) via Phishing Campaign to Attack Banking Customers

Researchers discovered a new wave of a phishing campaign that delivering a new variant of Houdini Worm named as WSH Remote access tool...
Forensics Tool

p0f – Passive Traffic Analysis OS Fingerprinting and Forensics Tool

P0f is an OS Fingerprinting and Forensics Tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the...
XENOTIME Hacking Group

XENOTIME Hacking Group Expands its Target to the U.S. Electric Utility Sector

The infamous XENOTIME Hacking group expanded its target beyond oil and gas to the electric utility sector. XENOTIME threat actor group responsible...
New Version of Echobot Botnet using 26 Powerful Exploits to Attack Oracle, D-Link, Dell Apps

New Version of Echobot Botnet using 26 Powerful Exploits to Attack Oracle, D-Link, Dell...

New Mirai level Botnet Echobot using 26 different exploits for the infection vectors that leveraging the vulnerabilities in Oracle, D-Link, Dell, LINKSYS,...
Network Penetration Testing Checklist

Most Important Network Penetration Testing Checklist

Network Penetration Testing determines vulnerabilities in the network posture by discovering Open ports, Troubleshooting live systems, services and grabbing system banners.
Security Operations Center

How to build and run a Security Operations Center

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information technology (IT)...
BackBox Linux

Free Open Source Penetration Testing Distro BackBox Linux 6 Released with new Hacking Tools

BackBox Linux is a free Open Source penetration testing and security assessment oriented Linux distribution providing a network and systems analysis toolkit.
Mozilla Thunderbird

Mozilla Released Security Updates for Thunderbird & Fixed Critical Security Flaws

Mozilla Released Security Updates for critical vulnerabilities that affected Thunderbird Mail client. The update fixes three high-level vulnerabilities and one low-level of...
Attack Tools

Hackers Use Advanced Targeted Attack Tools to Compromise Machines Running Older Versions of Microsoft...

A new large scale cyber attack combines both the regular cybercrime and targeted attack tools to deliver cryptocurrency miners and ransomware. The...
CSRF attack

Cisco Patches Critical Vulnerability that allows Remote Attacker to Conduct CSRF Attack

Cisco patches a critical vulnerability in the web-based UI (web UI) of Cisco IOS XE Software that could cause allow an unauthenticated,...
bypass ssl

Bypassing and Disabling SSL Pinning on Android to Perform Man-in-the-Middle Attack

Certificate Pinning is an extra layer of security to achieve protection against man-in-the-middle. It ensures only certified Certificate Authorities (CA) can sign...
Virtual private network

Virtual Private Network: What is it and Why is it So Important To Protect...

Computers and the Internet have become one of the main means of transmitting and processing information. Most of the information on the...

NewsLetter

          Sign up for Daily Updates 

        Mastery Web Hacking and
Penetration Testing Complete Bundle

Web Hacking and Penetration Testing

Most Popular

Recent News