Browsing category

Cyber Attack

Images Spreading Malware Through Stegosploit Tool

Now attacks are now through Internet images using Stegosploit tool which allows hackers to bind malware in an image. Security Researcher Saumil Shah has developed a Stegosploit tool where hackers can hide executable JavaScript code within an image to trigger a drive by download. Internet is becoming a major source of media and eventually becoming as a […]

YAHOO claimed about their Data Breach

On Thursday Yahoo claimed a massive attack or yahoo data breach on its network in 2014 allowed hackers to steal data from half a billion users and may have been “state sponsored”.  Full passwords, payment card data and bank account info weren’t targeted. A hacker was found to be selling login information related to 500 million Yahoo […]

300000+ financial records stolen from a Payment Gateway

Around 300,000+ users have had their payment or Financial records stolen either from payment processor BlueSnap or its customer Regpack. However, neither of the any company has admitted a data breach. BlueSnap could be a payment entry that permits websites to form payments from customers by giving businessperson facilities. Whereas RegPack could be a world on-line enrollment platform […]

UK Teen found guilty for selling DDoS Tools on Dark Web

A 20 years old boy named Grant Manser from a town near Birmingham,London,UK. UK teen has found guilty for selling DDoS tools on the Dark Web. This has been used to bring down websites and servers across UK and many European countries. The UK teen hosted a website on the Dark Web and started to […]

60 millions accounts hacked of Dropbox

Hackers have obtained credentials for more than 60 Millions accounts hacked for online cloud storage platform. Dropbox has confirmed the breach and notified its customers of a possible forced countersign resets. tho’ the announcement didn’t understand the precise variety of affected users. However, in a very choice of files obtained through sources within the information […]

HACKERS CRACKED NASA DRONE AND RELEASED DATA DUMP

ANONSEC Group hackers Cracked NASA Drone and Released Data Dump Hackers cracked National Aeronautics and Space Administration drone and free information dump . They additionally disclosed they tried to bring down a $222m world Hawk Drone into the Pacific. beside many flight videos and thousands of flight logs. the info dump enclosed phone numbers and […]

How to hack using Social Engineering

What do you mean by social engineering? Social engineering is the art of manipulating users of a computing system into revealing confidential information.  The term can also include activities such as exploiting human kindness, greed and curiosity. To gain access to restricted access buildings or getting the users to installing backdoor software.   HERE,   […]

Learn SQL Injection with Practical example!!

What is a SQL Injection? Full form of SQL is Structured Query Language. It is used to retrieve and manipulate data in the database. SQL Injection is an attack that poisons dynamic SQL statements to comment out certain parts of the statement or appending a condition that will always be true. How SQL Injection Works […]

OMG!! Accidentally Microsoft leaked backdoor Keys to BYPASS UEFI secure boot

Keys to BYPASS UEFI secure boot Microsoft accidentally leaked the Secret keys to BYPASS UEFI secure boot that allow hackers to unlock devices protected by UEFI (Unified Extensible Firmware Interface) Secure Boot feature. Secure Boot is a security feature that protects your device from certain types of malware, such as a rootkit, which can hijack your […]