Android
25 Million Android Users Infected with Powerful “Agent Smith” Malware Through Exploiting Several Mobile Vulnerabilities
Researchers discovered a new Android malware called "Agent Smith" that infects nearly 25 million mobile users around the globe without letting users know about...
Android
Mobile Hacking Firm Cellebrite’s New Premium Tool can Hack & Extract Data From All iOS and High-end Android Devices
Israeli forensics firm and well-known Law enforcement contractor Cellebrite released a public statement that they can hack any iOS and High-end Android devices for...
Exploit
RCE Vulnerability in Millions of Exim Email Server Let Hackers Execute Arbitrary Command & Control the Server Remotely
Critical Remote command execution vulnerability that affected Exim Email Server versions 4.87 to 4.91 let a local attacker or a remote attacker(with limited boundary)...
Exploit
Hacker Leaked New Windows 10 Zero-day Exploit Online To Bypass Already Patched Bug
SanboxEscaper, an anonymous hacker came back and leaked an another Windows zero-day PoC that exploits already patched (CVE-2019-0841) local privilege escalation vulnerability that...
Computer Security
Microsoft Warned Second Time to Update Windows for Bluekeep RDP Flaw – Exploits Already Available in Hackers Hand
Its a second time Microsoft urged users to update the recently patched Warmable BlueKeep Remote desktop protocol vulnerability due to the seriousness of this...
Cyber Attack
Hackers Now Using Stolen NSA Hacking Tool to Attack U.S Government Networks
Cybercriminals now attack the U.S government and shut down the network systems using EternalBlue, one of the most powerful hacking Tool developed by the...
Cyber Attack
Hackers Actively Targeting Microsoft SharePoint Servers Via CVE-2019-0604 Exploit
Hackers are actively exploiting a recently patched critical remote code execution vulnerability in SharePoint Server versions to inject China Chopper web shell which allows...
Botnet
Hacker Compromised Several IoT Botnet C2 Servers and Taken Control of It Due to Weak Credentials
A Hacker who goes by name Subby has compromised more than 29 IoT botnet command and control servers that were using weak login credentials.He...