East is a Python based security framework toolkit. It acts as a HTTP server and contains a wide range of different exploits...
Security researchers at Palo Alto Networks’ Unit 42 have discovered modified versions of the notorious Mirai and Gafgyt Internet of Things (IoT)...
At Defcon 2018, ex-NSA staffer and a popular Mac hacker Patrick Wardle presented his research work which involved bypassing the layers of...
ZombieBoy malware makes $1,000 Monero on a monthly basis. An independent security expert James Quinn has discovered a new family of cryptominers that...
The sale of zero-day exploits is a very profitable business that most people completely ignore. The International Institute of Cyber Security talks...
Recently cryptojacking attacks have been spreading like wildfire. At Imperva we have witnessed it firsthand and even concluded that these attacks hold roughly...
Newly discovered cryptocurrency mining malware called MasssMiner using various powerful exploits to compromise web servers to mine monero Cryptocurrency around the world....
Exploit Pack is a well-integrated open source tool for conducting professional penetration tests. As like any other penetration testing tool it requires...
The master key hack has the capability of unlocking not hundreds or thousands but millions of hotel rooms, claim F-Secure security researchers....
The IT security researchers at Fortinet have discovered a dangerous new malware that not only mines Monero cryptocurrency but also disables security features...
Newly discovered Microsoft office document exploit kit contains a variety of recent exploits and Malware such as Lokibot, Formbook and tracking kit...
rop-tool v2.4.1 A tool to help you writing binary exploits. An information security training expert gives a small explication about output of...
In modern Intel processors, there’s a hardware extension available named Software Guard Extension (SGX) to improve the security aspects. It provides a...
Findsploit is a simple bash script to quickly and easily search both local and online exploit databases. This repository also includes “copysploit”...
IoT Backdoor exploits called Doubledoor have been discovered which allows bypassing an IoT layered security that leads to taking complete control of...
A Newly discovered Android Remote Access Trojan called AndroRAT targeting unpatched Android Devices that exploit the publicly disclosed critical privilege escalation vulnerability and...
Probably, the most famous of the NSA tools leaked by the hacker group Shadow Brokers was EnternalBlue which gave birth to dangerous malware...
Security researcher tweaks exploits stolen from the NSA last year to affect nearly all versions of Windows. Exploits that were stolen from...
Another day, another Monero mining malware – This one uses two NSA exploits and so far it has mined over 8,900 Monero. It looks...
Due to the unprecedented and unexpected increase in the value of cryptocurrencies like Bitcoin, there has been a sudden rise in cyber-attacks...
A new sophisticated malware campaign dubbed “Zealot” leveraging NSA exploits targeting Windows and Linux systems to mine Monero on Internal Networks. Security...