Hot news

Magniber Ransomware

Magniber Ransomware Improves Its Obfuscation Techniques and Expands to Other Asian Countries

Magniber ransomware emerges again leveraging various obfuscation techniques and with refined source codes. The most famous and long-running browser exploitation toolkit Magnitude delivering Magniber...
IoT Cyber Attacks

Globally Gas Stations are Extremely Vulnerable to Internet of Things (“IoT”) Cyber Attacks

2018 begins with the rise of the Internet of Things (" IoT ") which is based on the existence of an interconnection of all...
Phishing Email Campaign

DanaBot Banking Trojan Steal Private and Sensitive Information

A new phishing email campaign targeting Australian customers with a fake standard MYOB-like HTML invoice template that contains FTP links pointed to compromised servers. With...

Exploit Windows Remote PC with EternalBlue & DoublePulsar Exploit through Metasploit

EternalBlue Malware Developed by National Security Agency (NSA) exploiting Windows based Server Message Block (SMBv1) and to be believed the tool has released by...
Ammyy Admin

Ammyy Admin Compromised – Beware If You Downloaded Ammyy Admin Between June 13 or...

Attackers compromised the official website of Ammyy Admin and made to serve a malicious version of Ammyy Admin instead of the legitimate one and...
Enterprise Cyber Security

Enterprise Cyber Security: 3 Ways to Protect Your Apps

Are you an enterprise business that implements apps into the day-to-day operational processes? If so, have you ever considered the security risks involved with...
APT28 Group

Russian APT28 Hacking Group Tracked Using a Variant X-Agent Delivering Via JPG File

Security researchers from Z-Lab at CSE Cybsec observed series of malware submitted to the online sandbox and a sample submitted to Virus Total that...
Debian 9.5 Released

Debian 9.5 Released With Fix for Spectre v2 and Other Security Issues

Debian 9.5 released with the fix for a number of security issues including Spectre and the update covers other Miscellaneous Bugfixes. The release is not...
Android Security

Most Important Android Security Penetration Testing Tools for Hackers & Security Professionals

Android security testing is more often used by security industries to test the vulnerabilities in Android applications. Here you can find the Comprehensive Android...
RDP Shops

Hackers Selling Airport Security System Credentials on Dark Web for $10

Hackers caught selling remote desktop protocol (RDP) access to hacked machines on Dark Web for $10. RDP shops emerge again and this time even...
Mobile Malware

Advanced Mobile Malware Attack Against iPhones in India using MDM System Control

Advanced mobile malware campaign targeted against 13 iPhone users in India and the attacker using an open-source mobile device management (MDM) system to control...
Hardware Firewall for your USB ports

Meet The USG Hardware Firewall To Protect Your USB ports From Untrusted USB Devices

USG is a Hardware firewall for your USB ports, permits users to associate USB flash drives and other USB gadgets to their PC without any...
GandCrab Ransomware Attack

New Version of GandCrab Ransomware Attack via Compromised Websites using SMB Exploit Spreader

The new version of GandCrab ransomware discovered that attack the target system using SMB exploit spreader through compromised websites that posed as a download site. GandCrab...
DOS attack

Inviteflood- Tool Used to Perform DOS Attack on VOIP Network

Inviteflood is a tool to perform SIP/SDP INVITE message flooding over UDP/IP to perform DOS Attack. This tool can be utilized to flood a target with...

Support Us



Sign up to get Hacking News & Tutorials to your Inbox along with 24k Readers 

            Android Parental Control

Most Popular

Recent News