Wohooo! Great news for hackers and penetration testers. Offensive Security has just released Kali Linux 2019.1, the first 2019 version of its...
It’s not at all surprising that downloading movies and software from the torrent network could infect your computer with malware, but it’s...
DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow for lateral movement,...
How do you check if a website asking for your credentials is fake or legit to log in? By checking if the...
A hacker who was selling details of nearly 620 million online accounts stolen from 16 popular websites has now put up a...
The United States Department of Justice has announced espionage charges against a former US Air Force intelligence officer with the highest level...
A serious security vulnerability has been discovered in the core runC container code that affects several open-source container management systems, potentially allowing...
Justniffer is a network protocol analyzer that captures network traffic and produces logs in a customized way, can emulate Apache web server...
Cybersecurity researchers have discovered a way to hide malicious code in Intel SGX enclaves, a hardware-based memory encryption feature in modern processors...
Ubuntu and some other Linux distributions suffer from a severe privilege escalation vulnerability that could allow a local attacker or a malicious...
What could be more frightening than a service informing you that all your data is gone—every file and every backup servers are...
Welcome back! Adobe has today released its monthly security updates to address a total of 75 security vulnerabilities across its various products,...
A new security vulnerability has been discovered in the latest version of Apple’s macOS Mojave that could allow a malicious application to...
Microsoft has issued its second Patch Tuesday for this year to address a total of 77 CVE-listed security vulnerabilities in its Windows...
Smart devices definitely make our lives easier, faster, and more efficient, but unfortunately, an insecure smart device can also ruin your day,...
A malicious Windows EXE file can even infect your Mac computer as well. Yes, you heard me right — a .exe malware...
A security researcher has discovered yet another cryptocurrency-stealing malware on the official Google Play Store that was designed to secretly steal bitcoin...
HTTrack allows you to download a World Wide Web site from the Internet to a local directory, building recursively all directories, getting...
Volatility Workbench is a graphical user interface (GUI) for the Volatility tool. Volatility is a command line memory analysis and forensics tool...
Apple has finally released iOS 12.1.4 software update to patch the terrible Group FaceTime privacy bug that could have allowed an Apple...
Google has launched a new encryption algorithm that has been built specifically to run on mobile phones and smart IoT devices that...