HNS IoT Botnet Scanning & Exploits the Routers to Compromise the Victims Networks
HNS(Hide & Seek) IoT botnet attack victims network using router-based vulnerabilities such as CVE-2016-10401 to propagate malicious code and steal the victim's sensitive information.
HNS communication...
Android Application Penetration Testing – Part 7
In Last Part Android Application Penetration Testing Part 6 We have seen about the Vulnerabilities has been categorized as TOP 10.
INSECURE LOGGING- ADB Logcat:
Logcat is...
Three Critical Attack Flaw Discover Against LTE Networks Standard that Hijack Network Connections
Researchers uncovered three novel attack Flaw in LTE (4G) network data link layer that allows hackers to perform a different level of attacks in...
Firebase Vulnerability Leaks 100 Million Sensitive Records – 2300 Firebase Databases & 3,000 iOS...
Newly discovered highly critical Firebase Vulnerability named as HospitalGown affected over 2,300 unsecured Firebase Databases & 3,000 iOS and Android Apps which exposed around 100...
Android Application Penetration Testing – Part 6
Let the fun begins. As per Owasp, Vulnerabilities has been categorized as TOP 10.
M1 - Improper Platform Usage ...
Russia Launch Heavy Cyber Attack on Singapore During Donald Trump & Kim Summit
Russia launches a rapid cyber attack on Singapore during President Donald Trump met with North Korean President Kim Jong-un in a Singapore hotel.
Cyber attacks...
Microsoft Cortana Vulnerability Allows Hackers to Break into your Locked Windows 10 PC
Microsoft Cortana Vulnerability that patched by Microsoft allows attackers to execute malicious code on the locked computer and gain access to the locked device...
OnePlus 6 Bootloader Vulnerability Could allows Booting any Image even the Bootloader is Locked
A critical OnePlus 6 vulnerability discovered that could allow booting the phone with a modified image and can get administrator privileges even if the...
Zero-Day Remote Code Execution Vulnerability Discovered in Microsoft Windows JScript
New Zero-day Remote code execution vulnerability discovered in Microsoft Windows JScript that allows an attacker to run the arbitrary code on vulnerable installations of Microsoft Windows.
Remote...
Multiple Vulnerabilities in D-Link Routers Allows Hackers Gain Complete Control & Extract Sensitive Data
Set of 4 Vulnerabilities are discovered in D-Link DIR-620 firmware that allows an attacker to exploit with the hardcoded default credentials to gain high...