NTLM Credentials

Hackers Can Steal NTLM Credentials Through PDF Files

Hackers taking advantage of the recently disclosed Microsoft Office Exploitation that allows to include information that one document has in another document. Instead of...
SquirtDanger Malware

Hacker Selling Powerful SquirtDanger Malware in Underground Market that Take’s Screenshot, Steal Wallets &...

Newly discovered botnet malware called SquirtDanger is widely Distributing, selling, and trading in the global underground market and infect the victims to steal the...
Ransomware Attack

New Ransomware Attack Failed to Decrypt Files Even After Ransom Paid Due to Hackers...

A Brand new ransomware attack widely distributed and infect the users based on their geolocation by checking the infected device IP address. Malware authors designed...
Internet Explorer Zero-Day

APT Cyber Attack Using Unpatched Internet Explorer Zero-Day to Hack Windows Computers

Cyber Criminals behind the APT attack using an Internet Explorer Zero-Day vulnerability to compromise the windows based computers. An APT hacking group using MS Office document attack...

Cybercrime-as-a-Service – DDoS Attack Services Available in Dark Web Markets for $10 per Hour

The number of cyberattacks is increasing and cybercriminal evolving with new business models such as Cybercrime-as-a-service. Recent studies indicate cybercrime’s cost to businesses globally as...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security