Root Cause of Powerful Internet Explorer (IE) Zero-day Vulnerability that Allow Attackers to Perform...

New Internet Explorer Zero-day remote code execution vulnerability has been discovered that allows an attacker could execute arbitrary code and take the complete control of the infected system. Once the attacker successfully exploits this zero-day vulnerability then they could take control...

100,000 Users Infected With the Password Stealing Malicious Chrome Extension Distributed Through Facebook

A new malware campaign propagating via crafted socially-engineered links on Facebook abuses the users by installing a malicious chrome extension and performs crypto mining, click fraud, Password theft and more. Facebook Malware campaigns are not new, this new campaign Modus...
Point-of-Sale

Powerful Point-of-Sale Malware “TreasureHunter ” Source Code Leaked Online

A  long-established Point-of-sale Malware TreasureHunter source code leaked online on Russian based underground forum. Leaked source code including the malware’s graphical user interface builder and administrator panel. This code will extremely helpful for cybercriminals to build their own Point-of-sale Malware and...
Bypass Two-Factor

Hackers can Bypass Two-Factor Authentication with Phishing Attack

Two-factor authentication is an additional layer of security on top of the username and password. It makes harder for attackers to gain access to personal devices or accounts. KnowBe4 Cheif Hacking officer Kevin Mitnick demonstrates the phishing attack with the...
7-Zip

Critical Security Vulnerability Affects All the Versions of 7-Zip Prior to 18.05

7-Zip is a free open source archiver with a high compression ratio. It is under the License of GNU LGPL & BSD 3-clause and can be used in any computers, including computers in the commercial organization. The software is in...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended