PoC

Using n1n3 to Simulate an Evasive Fileless Malware – Proof Of Concept

Fileless malware are types of malicious code used in cyber attacks that don’t use files to launch the attack and…

7 years ago

Hackers can use Surveillance Cameras and Infrared Light to Transfer Signals to Malware

Organizations use to protect their internal networks from Internet attacks by using firewalls, intrusion detection systems(IDSs) and intrusion prevention systems…

7 years ago

Critical Vulnerability with OnePlus devices allows Remote Exploitation

[jpshare]Security specialists from Alephsecurity found new insignificant vulnerabilities (CVE-2017-5948, CVE-2017-8850, CVE-2017-8851, CVE-2016-10370) on OnePlus One/X/2/3/3T OxygenOS and HydrogenOS. They vulnerabilities…

8 years ago

Millions of Smartphones are Vulnerable to inject Backdoor via open Ports

[jpshare]A Recent Research Revealed by University of Michigan  Research team, Open Ports Create Backdoors in Millions of Smartphones .This Vulnerability Existing…

8 years ago

A new IoT Botnet is Spreading over HTTP Port 81 and Exploit the Vulnerability in Security Cameras

[jpshare]A New IoT  Botnet Discovered which scanning the entire Internet and Exploit the vulnerability in many Security Cameras and 50k live…

8 years ago

Critical Microsoft Edge Vulnerability leads to Bypass the Password and Cookie Theft – Still Not Yet Patched

[jpshare]Critical Microsoft Edge Vulnerability Allows to  steal  the cookies and password revealed by Recent Research by  PoC (Proof-of-Concepts) .This Vulnerability…

8 years ago

WordPress vulnerable to Cross-Site Request Forgery in Connection Information – Not yet fixed with last Update

[jpshare] Wordpress vulnerable to Cross-Site Request Forgery in Connection Information - Not yet fixed with the last Update. WordPress is a…

8 years ago