PoC
Android Ecosystem Contains Several Hidden Patch Gaps that Can be Exploited by Hackers
The Android operating system is one of the most widely used platforms with 2 billion active users at the same time it facing a...
Security News
Over 65,000 Vulnerable Routers Abused by Multi-purpose Proxy Botnet
Attackers abuse the Universal Plug and Play (UPnP) protocol that comes with routers and uses the devices to create a powerful proxy network to...
Malware
52,000 Dangerous Command & Control Servers Take Down that Spreading Malware: It Performs 2M Malicious Redirects a Day
Around 52,000 Malicious Command & Control Severs has been taken down that continuously spreading Malware under well-documented infection chain called EITest.EITest is a Sophisticated...
Security News
Hackers can use Power Lines to Steal Data from Air-Gapped Computer
Hackers can use AC power lines as a covert channel to extract data from air-gapped networks through a malicious code that controls power consumption...
Security News
India’s Biggest Crypto Theft – Hackers Stolen Bitcoins Worth Rs 20 Crore From Exchange Firm
Hackers stole nearly 440 bitcoins that worth Rs 20 crore from the leading bitcoin exchange firm Coinsecure that has more than two lakh users...
DDOS
Cloudflare Launches Spectrum to Protect Almost Entire Internet
Cloudflare introduces Spectrum to protect any services that connected to the Internet. Spectrum works in the same way as the Cloudflare and it extends Cloudflare...
CVE/vulnerability
17 Years Old Hacker Finds Critical Flaw in Signal App that Allows Anyone to Bypass Password & Screen lock in iOS
A 17 Years old Hacker who inspired by Edward Snowden discovered a critical vulnerability in Signal app that allows anyone to Bypass Authentication of...
Security News
Fake Android Apps that Impersonate as Security Applications Found in Play store with 6000,000 Installations
Newly discovered Fake Android Apps in Google play store that posed as offering security proving unwanted ads and other potential cyber threats to installed...