Balaji

Beware! Mallox Ransomware Attacks IT Industries With a New Attack Pattern

A new variant of Mallox ransomware, also known as “Target company” ransomware, adopts a unique method of appending the name…

2 years ago

AndroRAT – A Remote Access Trojan Compromise Android Devices and Inject Root Exploits

A Newly discovered Android Remote Access Trojan called AndroRAT targets unpatched Android Devices that exploit the publicly disclosed critical privilege escalation…

2 years ago

Bypassing and Disabling SSL Pinning on Android to Perform Man-in-the-Middle Attack

Certificate Pinning is an extra layer of security to achieve protection against man-in-the-middle. It ensures only certified Certificate Authorities (CA)…

2 years ago

Microsoft Teams Vulnerability Let Attackers Deliver Malware From External Accounts

The latest version of Microsoft Teams had a security flaw uncovered recently by Max Corbridge (@CorbridgeMax) and Tom Ellson (@tde_sec),…

2 years ago

Masscan – World’s Fastest Scanner – Scan the Entire Internet in Under 6 Minutes

Masscan - Worlds fastest scanner can scan the entire Internet in under 6 minutes, transmitting 10 million packets per second. …

2 years ago

Authorities Shut down the Worlds Largest Darknet Child Sex Website That Contains 250,000 Unique Videos

“Welcome to Video”, the world's largest child sexual exploitation darknet website has been seized and the operator (Jong Woo Son,…

2 years ago

RCE Bug in Microsoft RDP Protocol Let Hackers Perform WannaCry Level Attack on 3 Million Vulnerable Endpoints

A critical remote execution vulnerability in Microsoft remote desktop services enables RDP Protocol let attackers compromise the vulnerable system with…

2 years ago

Malicious Hackers Selling Variety of Hacking Tools on the Dark Web that Start from $1 – Here is the Price list

Recent research revealed that the underground Dark web market flooding with a variety of hacking tools for the cheapest price…

2 years ago

Most Important Mobile Application Penetration Testing Cheat Sheet with Tools & Resources for Security Professionals

The Mobile Apps Pentesting cheat sheet was created to provide a collection of high-value information on specific mobile application penetration…

2 years ago

Critical Vulnerability in Microsoft Azure Let Hackers Take Over the Complete Control of the Azure Accounts

Researchers discovered a critical vulnerability in Microsoft Azure named "BlackDirect" that allows attackers to take over the Azure user's accounts…

2 years ago