PhishPoint

PhishPoint – Hackers Uses New Phishing Technique To Steal User Credentials

A new phishing technique dubbed PhishPoint affected about 10% of Office 365 users. With the new technique, attackers used SharePoint files to host phishing links. Office 365 scans for the link in the Email bodies for blacklist and suspicious domains,...
Teen

16 Years Old Australian Teen Hacked into Apple’s Secure Network & Download the Sensitive...

A teen from Australia got arrested and sentenced for hacking the Apple's ultimate secured network and accessing some sensitive data from an internal network. Melbourne Police did not reveal his name and identity and he accessed the Apple’s mainframe from...
Cortana Vulnerability

Microsoft Cortana Vulnerability Allows Hackers to Browse With Your Locked Computer

A new privilege escalation vulnerability with Cortana allows an attacker with physical access to do unauthorized browsing on the locked system. Security researchers form Mcafee observed two different scenario's, in the first scenario attackers, can force Microsoft Edge browser to...
ADFS

New Microsoft ADFS Protocol Vulnerability allow Hackers to Compromise the Entire Organization Network

New vulnerability discovered in Microsoft Active Directory Federated Services (ADFS) protocol that integrated with Multifactor authentication service allows an attacker to compromise the entire network of the target organization. This Flaw allows two-factor authentication that used in one account can be...
bypass ssl

Bypassing and Disabling SSL Pinning on Android to Perform Man-in-the-Middle Attack

Certificate Pinning is an extra layer of security to achieve protection against man-in-the-middle. It ensures only certified Certificate Authorities (CA) can sign certificates for your domain, and not any CA in your browser store. Application developers implement Certificate pinning to...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended