Windows

Hackers Find New Ways to Use .EXE File Against macOS to Launch Malware that Bypass Protection & Steal Data

Yes, What you hear is something mysterious that the .EXE file runs on macOS is totally new right. but this…

6 years ago

Penetration Testing Checklist for Android, windows, Apple & Blackberry Phones

Here we are going to have a look about some of Common & important  Penetration Testing Checklist for widely used…

6 years ago

A New Critical RCE Vulnerability in LibreOffice that Exploit Windows & Linux Systems

The researcher found new Remote code execution vulnerability in widely used LibreOffice that allows attackers to exploit the arbitrary code…

6 years ago

Hacker Leaked New Unpatched Windows Zero-day Vulnerability POC Online

A Security researcher posted new windows Zero-day vulnerability POC online that contain exploit code that allow attacker to read any…

6 years ago

Cybersecurity Myths: Is Mac OS Safer Than Windows?

There seems to be a general belief among the people that Mac OS is safer than Windows. We know many…

6 years ago

New Malware Abusing Two Legitimate Windows Files to Steal Victims Personal Data

Researchers discovered a new malware that abusing two legitimate windows files and use it against compromised victims to steal sensitive…

6 years ago

Again Hacker Exposed New Microsoft Unpatched Zero-day Bug In Twitter With PoC

New Microsoft unpatched Zero-day bug exposed in online again along with proof-of-concept(PoC) by the same security researcher who has previously…

6 years ago

New Xbash Malware Attack on Linux & Windows with Botnet, Ransomware & Coinminer Capabilities

Newly discovered Xbash malware with multiple capabilities such as  Botnet, Ransomware & Coinminer to compromise windows and Linux machine which is controlled…

6 years ago

Windows VBScript Engine Zero-day Flaw used by Darkhotel Hackers Group To Compromise Vulnerable Systems

A new zero-day exploit for Windows VBScript Engine discovered that belongs to North Korean cyber criminals gang called Darkhotel which is…

6 years ago

Microsoft Cortana Vulnerability Allows Hackers to Browse With Your Locked Computer

A new privilege escalation vulnerability with Cortana allows an attacker with physical access to do unauthorized browsing on the locked…

6 years ago