Hacking

WIBattack – SIM Card Browser Bug let Hackers Take Control Over Mobile Phones to Make Calls & SMS

The WIBattack vulnerability impacts hundreds of millions of telecom subscribers worldwide. The vulnerability comes from the sim card and it…

5 years ago

5 Steps How To Protect Your Company Infrastructure From Insider Threats

While most people worry about threats from hackers trying to breach their security from the outside, it’s just as, if…

5 years ago

Wikipedia Hacked – Hackers Take Down the Website with Massive DDOS Attack

Wikipedia Hacked: cybercriminals have launched a massive DDOS attack on Wikipedia and take down the website in several countries in Europe…

5 years ago

Hacker Successfully Jailbreak the Current Version of iOS 12.4 – Millions of iphone Users are Vulnerable to Hack

Security researcher successfully Jailbreak the latest version of iOS 12.4 by taking advantage of the unpatched vulnerability that has been…

6 years ago

Severe Bugs in U.S.Military Fighter Jet Let Hackers Takes Sensitive Controls while Jet Flying

A group of seven Ethical hackers who were exclusively allowed to test the flight system for a U.S. military fighter jet,…

6 years ago

Chinese Hackers Launching Zegost Malware to Attack Government Networks Via Weaponized MS Powerpoint

Researchers discovered a new campaign with Zegost info stealer malware that believed to be originated from Chinese based threat actors…

6 years ago

Hackers Using Fake Google Domain to Inject Credit Card Skimmer in Magneto Sites

Cybercriminals using fake Google domain to infect the Credit card skimmer in Magneto websites using Internationalized domain name (IDN) EX:…

6 years ago

APT15 Hackers Using Steganography Technique to Drop Okrum Backdoor Via PNG File to Evade Detection

Researchers discovered a previously unseen malware called Okrum that distributed from APT15 threat group via a hidden PNG file with…

6 years ago

U.S Launched Cyber Attack on Iranian Military Computers After U.S Military Drone Shot Down by Iran

United States Military launched a cyber attack on the Iranian Military computers that used to control the Iran missiles after…

6 years ago

Hacking vs Spying: How Puzzling it is to Find the Hackers in Cyber World

The cyber world is a weird world and cell phones have added a new dimension to it. You can’t judge…

6 years ago