BitTorrent

Russian based Backdoor Contain BitTorrent Client Infected more than 400,000 Systems

A Massive malware outbreak that distributed through  Russian based backdoored BitTorrent client and infected more than 400,000 users within 12 hours on March 6,...

BLEEDINGBIT – Two Bluetooth Chip-level Vulnerabilities Affected Millions of Enterprise Wi-Fi Access Point Devices

Researcher's discovered 2 critical Bluetooth vulnerabilities in BLE (Bluetooth Low Energy)  is named as " BLEEDINGBIT " affected millions of BLE embedded devices that...
WordPress Security Plugin

Hackers Hidden Backdoor Inside of Malicious WordPress Security Plugin

Hacker Hide the PHP Backdoor Inside of the WordPress Security Plugin called X-WP-SPAM-SHIELD-PRO" code and it contains Legitimate Plugin Name but it has Hidden Backdoor...
njRAT Backdoor

APT-C-27 Hackers Launching njRAT Backdoor via Weaponized Word Documents to Control the Compromised Device

Goldmouse APT group (APT-C-27) now start exploiting the WinRAR vulnerability (CVE-2018-20250) to hide the njRAT backdoor and targeting users reside in the...
Metasploit

Turla Mosquito Hacking Group Exploiting Backdoor Using Metasploit To Compromise the Target System

Turla cyber espionage group leveraging Powerful Mosquito backdoor using open source exploitation framework Metasploit for an initial stage of the attack on the target system. Turla hacking...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security