Hot news

Online password Bruteforce attack with Hydra

Online Password Bruteforce Attack With THC-Hydra Tool -Tutorial

According to Kali, Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules...
Bitcoin Price Climbs as High as Ever

Bitcoin Price Climbs as high as Ever – History Created

Bitcoin Price Climbs as High as Ever reaches $2000 without precedent for history. The cash's value ascended as much as 2.62% amid the session...
Android Application Penetration testing Part 3

Android Application Penetration testing Part 3

With my last article(Android Application Penetration testing Part 1), (Android Application Penetration testing Part 2)we had look on basic architecture and penetration testing tools....

New SMB Network Worm “MicroBotMassiveNet” Using 7 NSA Hacking Tools , Wannacry using only...

A New Network Worm called "MicroBotMassiveNet" (Nick Name:EternalRocks) Discovered Recently  which is also  Performing in SMB Exploit as Wannacry ."MicroBotMassiveNet" self Replicate with the targeting...
Offline password cracking with John the Ripper

Offline Password Cracking with John the Ripper – Tutorial

John the Ripper is intended to be both elements rich and quick. It combines a few breaking modes in one program and is completely...
Penetration Testing Checklist for widely used mobile Devices

Penetration Testing Checklist with Android, windows, Apple & Blackberry Phones

Here we are going to have a look about  some of Common & important  Penetration Testing Checklist for widely used OS Platforms for mobile...
ATM Black box attacks

ATM Black box attacks – ATM Jackpotting

Culprits in charge of this new and advanced technique for ATM jackpotting were distinguished in various nations over various timeframes in 2016 and 2017. The...
Zomato's Massive Data Breach about 17 Million User Record Stolen

Zomato’s Massive Data Breach About 17 Million User Record Stolen and Revealed in Dark...

Zomato Reports a massive Data breach that, 17 Million user records were stolen. Zomato over 120 million active users in worldwide and Zomato offers...
Joomla! 3.7.1 is released to address a critical SQL Injection Vulnerability

Joomla! 3.7.1 is released to address a critical SQL Injection Vulnerability

A critical SQL Injection Vulnerability( CVE-2017-8917) with Joomla! 3.7, if you are Joomla user it's you need to update immediately.  Joomla! is a content management system...

Support Us

2,212FansLike
1,028FollowersFollow
1,516FollowersFollow

Most Popular

Recent News

Humorous Android ransomware force victim to speak unlock code

Android Malware which has admirable listening quality,  force victim to speak unlock code. The latest variant...

Cisco-Global-Exploiter – Exploit 14 vulnerabilities in Cisco switches and routers.

Cisco Global Exploiter (CGE), is an advanced, simple and fast security testing tool/ exploit engine,...

Is it a legitimate website

Malicious websites available every where over Internet, it is very difficult to find a trustworthy...

Indicator Of Attack(IoA’s) And Actvities – SOC/SIEM – A Detailed Explanation

What is an Indicator of Attack (IOA) IoAs is some events that could reveal an active...

Zomato’s Massive Data Breach About 17 Million User Record Stolen and Revealed in Dark web

Zomato Reports a massive Data breach that, 17 Million user records were stolen. Zomato over...

Mass Scan Revealed More Than 30000 Windows Computers Infected by NSA backdoor DoublePulsar

 A Recent Mass Scan Revealed That More than 30000 Windows Machine Infected  by National Security Agency ...

Facebook Messenger gets New Group Video Chat Feature: Stephane Taine, Product Manager, Messenger

Facebook has thrilled us by launching the most requested Messenger feature ever - the ability...

These Google Play Apps are Steal your Instagram Credential -Beware

ESET Security Discovered 13 malicious apps which performing to steal your instagram creditionals .These apps...

Google and Bing Are About to Make it Harder to Find Illegal Content Online

Google and Microsoft have vowed changes to their web indexes which will make life harder...

A Highly Sophisticated Victim’s Activities Monitoring Android Spyware “Notorious Pegasus” Discovered

Notorious surveillance software called Pegasus Andriod spyware has been Found which Monitor all the Vicims...

Hacked Sony account spreads false news – “RIP @britneyspears”

Britney Jean Spears (born December 2, 1981) is an American singer, dancer and actress. Born...

Skipfish | Web application security scanner

Skipfish Skipfish is an active web application security reconnaissance tool. It prepares an interactive sitemap for...

Digital Weapons of NSA-linked Microsoft hacking tools leak by Shadow Brokers

The Shadow Brokers, a group of hackers that have stolen exploits and hacking tools from...

Virus and Trojan attacks target 1,000+ Androids daily in the UK

Q1 2016 figures from anti-virus firm 360 Security found 86.83 per cent of UK users...

Chinese IoT Firm Siphoned Text Messages, Call Records

  A Chinese technology firm has been siphoning text messages and call records from cheap Android-based...