SOC

Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation

What is an Indicator of Attack (IOA) IoAs is some events that could reveal an active attack before indicators of compromise become visible. Use of IoAs provides a way to shift from reactive cleanup/recovery to a proactive mode, where attackers...
Android Ecosystem

Android Ecosystem Contains Several Hidden Patch Gaps that Can be Exploited by Hackers

The Android operating system is one of the most widely used platforms with 2 billion active users at the same time it facing a lot of security issues that need frequent fixes and release the patch for the users...
Password hash

Hackers Can Steal Password Hashes & Crash Windows systems Automatically with Microsoft Outlook and...

The researcher discovered a flaw that combined with Microsoft Outlook and OLE which leads to steal the Password hash and eventually crash the windows system. OLE (Object Linking and Embedding) is a component document technology created by Microsoft that helps...
BitTorrent

Critical Flaw in Popular BitTorrent Transmission Client Leads to an Attacker Perform Remote Hack...

A critical flaw discovered in BitTorrent Transmission client app that allows an attacker can remotely control the victims PC by using a method called DNS Rebinding which leads to Transmission control can remotely access by an attacker via a...
Steganography

Risk with Steganography and Importance of running Steganalysis with Network Systems

Steganography is an art of hiding messages covert way so that exclusive the sender and recipient know the original message. This technique permits sender and receiver to communicate secretly and the third party won't mindful of the correspondence happen. It replaces...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

DDoS Attack Mitigation Plan - Free Trial

Most Popular

Recommended