Point-of-Sale

Powerful Point-of-Sale Malware “TreasureHunter ” Source Code Leaked Online

A  long-established Point-of-sale Malware TreasureHunter source code leaked online on Russian based underground forum. Leaked source code including the malware’s graphical user interface builder and...
Bypass Two-Factor

Hackers can Bypass Two-Factor Authentication with Phishing Attack

Two-factor authentication is an additional layer of security on top of the username and password. It makes harder for attackers to gain access to...
7-Zip

Critical Security Vulnerability Affects All the Versions of 7-Zip Prior to 18.05

7-Zip is a free open source archiver with a high compression ratio. It is under the License of GNU LGPL & BSD 3-clause and...
Maikspy Spyware

Maikspy – A Spyware Attack on Windows & Android Users via Adult Games

A newly discovered dangerous Maikspy spyware distributing through adult games that specifically target Windows and Android Users to steal sensitive private data. Initially, Maikspy spyware...
baseStriker

baseStriker – 100 Million Email Users are Vulnerable Critical Office 365 Zero-day Flaw

A new security flaw uncovered in Office 365 dubbed baseStriker puts 100 Million Email Users at risk. With this vulnerability, attackers can bypass all...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security