FIN7 APT Hackers Added New Hacking Tools in Their Malware Arsenal to Evade AV Detection

Researchers discovered 2 new hacking tools called BOOSTWRITE and RDFSNIFFER that were added in FIN7 groups malware arsenal with sophisticated capabilities and techniques. FireEye Mandiant investigators uncovered that these new hacking tools were added for hijacking the DLL load order of the legitimate Aloha utility and load the malware. The Tool named BOOSTWRITE is a […]

11 ‘Hidden’ Android 10 Features We Have Found So Far

The latest Android version has been out for more than a week now, and many of us are working hard to find some hidden Android 10 features to satisfy ourselves. Although, the definition of what can be called ‘hidden’ depends from person to person. While in some sense, Android 10 lets you “Uninstall” your Screen, […]

Shodan and Censys: Finding Hidden Parts On the Internet With Special Search Engines

Our digital lives connect massive things with the Internet. Starting with Smartphones, Wi-Fi routers, Surveillance Camera, Smart TV, SCADA networks and leading to traffic light management systems are exposed to the internet. In 2016 impact of Mirai botnet attack, which was orchestrated as a distributed denial-of-service attack affects 300,000 vulnerable Internet of Things devices. IoT […]

This Innocent USB Charger Is A Hidden Surveillance Camera No One Can See

To tackle uninvited burglars and other intrusions, many people resort to installing closed-circuit TV cameras in their homes. But the problem with CCTV cameras is that many of these can be easily spotted and can alert the person you wish to track. There is also a breed of security cameras that can hide in plain […]

Apple Could Introduce Face ID On Mac With Added Functionalities

Apple introduced its facial recognition tech dubbed Face ID with the iPhone X, following which all the latest iPhones have it, even the iPads. Furthering its reach, the Cupertino tech major could soon add the Face ID feature to Macbooks. According to a recent patent granted by the United States Patent and Trademark Office (USPTO), […]

Hack your friends Facebook account using HiddenEye

Phishing is what mostly victims fall into trap of fake pages. There are many of methods for creating fake pages. Phishing is an way to obtain login credentials such as usernames & passwords or confidential details by creating cloned pages of original web pages. According to ethical hacking researcher of international institute of cyber security […]

Hidden Eye – Modern Phishing Tool With Advanced Functionality

Ultimate Phishing tool with android support available comes with 34 attack vectors of the most popular used services. Hidden Eye Modern Phishing Tool Features 1) LIVE ATTACK Now you will have live information about the victims such as : IP ADDRESS, Geolocation, ISP, Country, & many more. 2) COMPATIBILITY All the sites are mobile compatible. […]

How To Play The Hidden ‘Tennis Game’ On Google Search?

Wimbledon is coming to an end this weekend. To mark the occasion, Google is offering a new Easter Egg in the form of a tennis game. It can be played on your computer or phone — you just have to know where to look for it. To find the tennis game, type “Wimbledon” on Google […]

Modder Connects External PCIe To Raspberry Pi 4

Raspberry Pi is a low-cost computer designed for tech enthusiasts, students, and engineers who wish to make extreme use of limited hardware. Just two weeks ago, the Raspberry Pi 4 was unveiled, which caught the attention of technology enthusiasts. The latest version of Raspberry Pi is a big improvement over the previous version despite its […]

More than 25 million smartphones infected with new malware hidden in WhatsApp

An investigation conducted by system audit specialists from the security firm Check Point has revealed the existence of new smartphone malware; dubbed “Agent Smith”, this malware has already infected more than 25 million users worldwide, mainly in India, where around 15 million cases of infection have been detected. This malware hides from the user disguising […]

Last Facebook outage exposed users’ images hidden information

Facebook suffered a massive outage in its suite of apps yesterday morning; According to website security audit specialists, this flaw provided social network users with certain details about Facebook’s machine learning system for sorting all the users’ content. In addition to Facebook, Instagram and WhatsApp services suffered several failures and interruptions, affecting content displayed, content […]

Microsoft suddenly introduced the Windows 1.0

The Microsoft Windows team released a weird video on Twitter, and the article said that it will launch a new Windows 1.0, and will include applications such as the MS-Dos Executive and clock. The video content is mainly a clip of the nostalgic logo from Windows 1.0 to Windows 10 and is displayed in a […]

Excel Power Query vulnerability puts 120 million users Vulnerable to Remote DDE Attacks

Recently, security researchers at the Mimecast Threat Center discovered a new vulnerability in the Microsoft Excel spreadsheet application, which has caused 120 million users to be vulnerable to cyber attacks. The researcher points out that this vulnerability allows an attacker can use Excel’s Power Query tool to enable remote dynamic data exchange (DDE) on a […]

FreshOnions TorScraper – TOR Hidden Service Crawler

This is a copy of the source for the http://zlal32teyptf4tvi.onion hidden service, which implements a tor hidden service crawler / spider and web site. Features Crawls the darknet looking for new hidden service Find hidden services from a number of clearnet sources Optional fulltext elasticsearch support Marks clone sites of the /r/darknet superlist Finds SSH […]

HiddenWasp, a dangerous malware that affects Linux systems

Although they are not uncommon, network security specialists mention that the security risks present in Linux systems are not known broadly enough. Either because of its little offensive nature or because the security mechanisms of these systems overlook them, these security threats do not receive as much diffusion as those that impact Windows systems. However, […]

HiddenWasp: New Malware Targets Linux Machines To Control Them Remotely

Unlike the Windows cybersecurity ecosystem, the threats concerning the Linux systems aren’t often discussed in much detail. The attacks either go undetected by the security mechanisms laid out by enterprises or they aren’t too severe to be reported widely by the security researchers. However, as pointed out by cybersecurity firm Intezer, malware with sophisticated evasion […]

New way to detect the malware hidden in hardware

While detecting malicious software hidden in hardware parts is an incredibly complex task, cyber forensics course specialists believe that important steps are being taken to address this attack vector. Recently, threat actors have refined their methods to hide malware within the firmware of hard disks, graphics cards, motherboards and other commonly used components for the […]

Wall Street Market, drug sales site on dark web, was suddenly closed

Cyber forensics course specialists reported that Wall Street Market, a drugs selling site in dark web, has been closed suddenly, becoming the second website of its kind that closes during the last month. This platform was only accessible through the Tor web browser. A few weeks ago Dream Market, one of the largest illicit shopping […]

Google to Block Sign-ins from Embedded Browser Frameworks

In a bid to improve its phishing protections and to protect users from MITM attacks, Google has come up with a new move- a decision to block users sign-in using Embedded browser frameworks. GBHackers on Security reports, “Google announced a new security update to block users sign-in using Embedded browser frameworks in order to improve […]

Google To Ban Embedded Browser Logins To Stop Man-In-The-Middle Attacks

Google will ban logins from embedded browser frameworks, starting June 2019. The reason is the increased risk of phishing hacks using the man-in-the-middle attack. In this exploit, the conversation between the two parties is intercepted by a third unknown entity, who can change its content. Users are most vulnerable to man-in-the-middle attacks when they login […]