A New Ransomware Attack Posed as Windows Activator Emerging in Wild With Hidden Functions

A new ransomware distributed by attackers posing as a Windows Activator appearing to be distributed through external network drives. The ransomware found to be active from August 7th and spreading since then. Researchers from 360totalsecurity spotted the ransomware contains hidden configuration function and the information used for encryption. Once the ransomware execution started it executes […]

How To Unlock And Use Hidden Thesaurus In iOS 12?

iOS 12 is set to roll out next month in Apple’s official iPhone launch event. The latest version of iOS brings many new features such as improvements in the photos app, USB restricted mode, grouped notifications, etc. Apart from these new features, Apple has also added some small but handy features to improve the overall […]

9 Android Pie Hidden Features: Best Android 9 Tricks You Might Have Missed

Now that Android Pie is live, there are way too many exciting features to look up to. While some will get easily identified, few others might get lost or maybe completely forgotten in our daily usage. Like, did you know? You can roll back to the three-button navigation system from the new Android Pie Gesture Navigation. Well […]

Aron – A GO Script For Finding Hidden GET & POST Parameters

Aron is a simple GO script for finding hidden GET & POST parameters with bruteforce. Aron Installation $ git clone https://github.com/m4ll0k/Aron.git aron $ cd aron $ go get github.com/m4ll0k/printer # now check if $GOPATH is set $ go env | grep -i gopath # if $GOPATH not set, try with: $ export GOPATH=$HOME/go $ go […]

Cansina – Open Source Hidden Content Discovery Tool

Reconnaissance is one of the first steps to conduct within a pen test engagement. During this stage, information is gathered using different tools and sources. Some web applications may hide web resources from public, there is however a way to discover the hidden content. Cansina is one such open source tool that helps aid in […]

Routersploit – A Free Framework for Exploiting Embedded Devices

Routersploit is an open source framework used for exploiting vulnerabilities in embedded devices like routers. Routersploit is loaded with various modules that help the tool perform its functionality. These modules can be divided into the following categories. (a) Scanner Modules: Scanner modules are responsible for finding the vulnerabilities in the routers or embedded devices. (a) […]

A Hidden Bug In The System Puts 21,000 U.K. Students At Risk

A hidden bug found within an information management system may have compromised the data of 21,000 U.K. schools, who are all now at risk of a possible breach. It appears the matching algorithm of student records of the system is failing and producing incorrect results when queried. The glitch introduced a peculiar bug where students were […]

Patching DoublePulsar to Exploit Windows Embedded Machines

During one of my engagements, I discovered some Windows devices that were affected by the MS17-010vulnerability. One of these devices caught my attention as it’s something I haven’t encountered yet – a Windows Embedded operating system.  Since it’s vulnerable to MS17-010, I immediately tried the relevant Metasploit modules. However, none of them worked. All I got was just […]

NSA Spying Centers Hidden Inside AT&T Buildings In 8 US Cities

The Intercept, the publication known for its groundbreaking reports, has come up with another revealing piece (via TechCrunch) about the National Security Agency. The report describes 8 AT&T data facilities that serve as hubs for NSA’s spying activities. The eight facilities are located in major US cities, including Atlanta, Chicago, Dallas, LA, New York City, San […]

8 Google Maps hidden places You are not allowed to see

If you thought you have seen it all then you were wrong. In fact, thanks to Google Maps there are plenty of places that are kept hidden from the public view – It is also a fact that Google Maps has deliberately hidden these places. But why? The reason for this censorship is mostly unknown, however, there […]

VPNFilter Router Malware Is Still Alive: More Devices Infected, New Capabilities Added

In late May, Cisco security researchers uncovered a router-hacking malware named VPNFilter, which was reported to infect more than 500,000 consumer Wi-Fi devices. At that time, the infected router belonged to companies like TP-Link, Linksys, MikroTik, and Linksys. As per the latest development report, additional device vendors are being targeted by the malware. The new […]

Two New Malware Linked To Hidden Cobra Hackers- FBI Issues Alert

The US-CERT issued a joint technical alert from DHS and the FBI, warning that two new identified malware has been used by the prolific North Korean hacking group APT known as Hidden Cobra by cobra hackers. Hidden Cobra Hackers, often known as Lazarus Group and Guardians of Peace, reportedly backed by the North Korean government […]

Ubuntu Snap Store Apps Contains Hidden Cryptocurrency Miner Malware

An Ubuntu user identified a malicious code that mines Bytecoin (BCN) hidden in the source code of the Ubuntu snap package (2048buntu and Hextris) on the official Ubuntu Snap Store. The malicious app 2048buntu appears to be a carbon copy of the legitimate 2024 game that hosted on the Ubuntu Snap Store. Both the packages […]

Backdoor hidden in the npm JavaScript package

According to researchers, the node’s Packet Manager (npm) team just avoided a disaster when it discovered and blocked the distribution of a backdoor mechanism cleverly hidden inside a JavaScript package. This backdoor mechanism was found by information security experts in “getcookies”, a new npm package to work with browser cookies. The team of professionals of […]

HiddenMiner Android Monero Mining Malware Cause Device Failure

Another day, another Android malware – This time, the malware not only comes with Monero mining capabilities but its continuous mining process drains the targeted device. The IT security researchers at Trend Micro have discovered a sophisticated Moreno mining malware targeting Android users in the name of fake Google Play update. As of now, its prime […]

Hidden For 6 Years, ‘Slingshot’ Malware Hacks Your PC Through Your Router

The researchers at Kaspersky Labs have uncovered a malware, dubbed Slingshot, that has been able to hide for around six years. While the exact number is not known, the malware has infected around 100 users in different countries located in Africa and the Middle East. Slingshot is believed to be active since 2012 through February […]

With New Bankshot Malware Cybercrime Group Hidden Cobra Targets Financial Sectors

Hidden Cobra cybercrime group continues to target multiple industries and financial sectors. With this new aggressive campaign, the group implanted Bankshot malware in Turkish financial system. Bankshot malware last appeared in the year of 2017, it is designed to remain persistent in the victim’s network, also it is capable of searching for hosts that related […]