Litesploit is a library and intepreter for penetration testing tools. This includes exploits, tools and litepreter. Litesploit support for Linux like ubuntu...
Allwinner’s ARM Linux kernel includes “rootmydevice” code that gives apps root. Allwinner, a Chinese system-on-a-chip company that makes the processor used in...
Last week, US-based cyber security firm Hold Security recovered 272.3 million stolen accounts from a fraudster. What the hack? More than 88,000...
Can you capture the flag? Facebook’s Capture the Flag program can be used to teach basic security skills. Facebook wants to teach...
Attackers can score user privileges thanks to heap corruption hassle Some of the world’s biggest security and software vendors will be rushing...
Android malware is not unusual; we’ve even seen it pop up in Google’s Marketplace app on several occasions. Increasing in both sophistication...
In 2015, the FBI hacked Tor to identify users of child sex websites. Now, Mozilla is begging courts to divulge to it...
Short Bytes: GitHub has just released the version 1.0 of Electron, its free and open source application building platform. After two years of...
Short Bytes: Microsoft is killing the free Windows 10 upgrade offer after July 29, 2016. But, what to do if you want...
Short Bytes: A bored hacker has been playing around with several subreddits for almost a week and there is nothing that Reddit...
Short Bytes: The code of Linux kernel of Chinese chipmaker Allwinner contains an easily exploitable root backdoor. Combined with networked services, this could...
A hacker is taking over subreddits and exposing Reddit’s poor security! Some hack for cause, some hack for money but @TehBVM on...
Yahoo mail Hammered by Congress for its Inefficiency in Preventing Phishing Attempts Symantec’s newest threat report claims that email phishing scams have...
Short Bytes: Fedora 24 Beta release is out for testing with the latest features. This latest build is powered by the newest...
Microsoft Disabling Controversial Wi-Fi Sense Feature in Upcoming Windows 10 Anniversary Update Windows 10 users can breathe a sigh of relief because...
Short Bytes: To get a faster internet connection speed, one can practice different methods and hacks. These methods to accelerate your internet speed...
The famous adult content website Pornhub has decided to let hackers report security flaws and vulnerability on its computer system and earn...
Spooftooph is designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to...
Maybe the FBI should team up with India because that country’s government says it can hack into Apple’s iPhones. Both think access...
Short Bytes: Facebook has open sourced its hacking game platform Facebook Capture the Flag (CTF). Students and schools can take advantage of...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage