BLEEDINGBIT – Two Bluetooth Chip-level Vulnerabilities Affected Millions of Enterprise Wi-Fi Access Point Devices

Researcher's discovered 2 critical Bluetooth vulnerabilities in BLE (Bluetooth Low Energy)  is named as " BLEEDINGBIT " affected millions of BLE embedded devices that allows an attacker to access enterprise network without authentication. These serious vulnerabilities existing in the BLE...
Cryptocurrency App

Widely Used Cryptocurrency App Launching 2 Different Powerful Backdoor on Mac Users

A cryptocurrency app, CoinTicker which is widely used in cryptocurrency industry pushing 2 different backdoors on Mac users to steal the cryptocurrency coins and other malicious activities. CoinTicker app actually appears as a legitimate application that helps to peoples who is...

New Android Malware Turns Your Mobile Devices into Hidden Proxies

Cyber criminals distributing new Android malware via Phishing email campaign that turns infected smartphones into hidden mobile proxies. This malicious app installing a fake voice-message app and turns it as a network proxies without users knowledge. This Malware named as TimpDoor...

DarkPulsar – A Shadow Brokers Group’s New Hacking Tool Leak To Open Backdoor &...

Shadow Brokers Hacking Group's new administrative module Tool called DarkPulsar Leaks with persistance backdoor to provide remote control to the attackers. There are two sophisticated Frameworks called DanderSpritz and FuzzBunch published in 2017 by the same Shadow Brokers. Frameworks framework modules contain...
Advanced Backdoor

Most Advanced Backdoor Obfuscation and Evasion Technique That used by Hackers

Cybercriminals are using the most sophisticated techniques to bypass the security controls in various organization such as  IT, medical, manufacturing industries, energy sectors, even government entities. Sometimes developers are creating a backdoor for a legitimate purpose such as maintenance and easy...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended