Bypass Two-Factor

Hackers can Bypass Two-Factor Authentication with Phishing Attack

Two-factor authentication is an additional layer of security on top of the username and password. It makes harder for attackers to gain access to personal devices or accounts. KnowBe4 Cheif Hacking officer Kevin Mitnick demonstrates the phishing attack with the...
7-Zip

Critical Security Vulnerability Affects All the Versions of 7-Zip Prior to 18.05

7-Zip is a free open source archiver with a high compression ratio. It is under the License of GNU LGPL & BSD 3-clause and can be used in any computers, including computers in the commercial organization. The software is in...
Maikspy Spyware

Maikspy – A Spyware Attack on Windows & Android Users via Adult Games

A newly discovered dangerous Maikspy spyware distributing through adult games that specifically target Windows and Android Users to steal sensitive private data. Initially, Maikspy spyware posed as U.S based adult film actress and trick users to click and download it...
baseStriker

baseStriker – 100 Million Email Users are Vulnerable Critical Office 365 Zero-day Flaw

A new security flaw uncovered in Office 365 dubbed baseStriker puts 100 Million Email Users at risk. With this vulnerability, attackers can bypass all the Microsoft security services including its advanced services like ATP, Safelinks, etc. The traditional HTML email...
SynAck Ransomware

SynAck Ransomware Attack Using Sophisticated Process Doppelgänging Technique to Bypass the AV Detection

Newly Emerging SynAck Ransomware using a sophisticated technique called Process Doppelgänging to bypass various modern security solutions. SynAck is the first Ransomware using this modern Anti-analysis and anti-detection techniques(Process Doppelgänging) to evade the security and take over the victims machine to perform...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended