A new ransomware distributed by attackers posing as a Windows Activator appearing to be distributed through external network drives. The ransomware found...
iOS 12 is set to roll out next month in Apple’s official iPhone launch event. The latest version of iOS brings many...
Now that Android Pie is live, there are way too many exciting features to look up to. While some will get easily identified,...
Aron is a simple GO script for finding hidden GET & POST parameters with bruteforce. Aron Installation $ git clone https://github.com/m4ll0k/Aron.git aron...
Reconnaissance is one of the first steps to conduct within a pen test engagement. During this stage, information is gathered using different...
Routersploit is an open source framework used for exploiting vulnerabilities in embedded devices like routers. Routersploit is loaded with various modules that...
A hidden bug found within an information management system may have compromised the data of 21,000 U.K. schools, who are all now...
In my opinion, haveibeenpwned is the best website to find out about the security of your password. It has gone through a...
During one of my engagements, I discovered some Windows devices that were affected by the MS17-010vulnerability. One of these devices caught my attention...
The Intercept, the publication known for its groundbreaking reports, has come up with another revealing piece (via TechCrunch) about the National Security Agency....
If you thought you have seen it all then you were wrong. In fact, thanks to Google Maps there are plenty of...
In late May, Cisco security researchers uncovered a router-hacking malware named VPNFilter, which was reported to infect more than 500,000 consumer Wi-Fi...
The US-CERT issued a joint technical alert from DHS and the FBI, warning that two new identified malware has been used by...
HIDDEN COBRA is one of the well known hacking group who is behind the North Korean government spreading Powerful Joanap Backdoor and Brambul...
An Ubuntu user identified a malicious code that mines Bytecoin (BCN) hidden in the source code of the Ubuntu snap package (2048buntu...
According to researchers, the node’s Packet Manager (npm) team just avoided a disaster when it discovered and blocked the distribution of a...
A new Monero Mining Android malware dubbed ANDROIDOS_HIDDENMINER that uses the device CPU power to mine Monero malware and could cause the...
Another day, another Android malware – This time, the malware not only comes with Monero mining capabilities but its continuous mining process...
Messages sent to your iPhone may not be as private as you think.
The researchers at Kaspersky Labs have uncovered a malware, dubbed Slingshot, that has been able to hide for around six years. While...
Hidden Cobra cybercrime group continues to target multiple industries and financial sectors. With this new aggressive campaign, the group implanted Bankshot malware...