A new sophisticated malware campaign dubbed “Zealot” leveraging NSA exploits targeting Windows and Linux systems to mine Monero on Internal Networks. Security...
Findsploit is a simple bash script to quickly and easily search both local and online exploit databases. Findsploit:https://github.com/1N3/Findsploit Installation: git clone https://github.com/1N3/Findsploit.git...
It is common notion that antivirus software keeps our computers safe from all types of bugs and malware. However, it seems that...
Gamers were delighted with the release of world’s second most popular video game Grand Theft Auto V (GTA 5) released by Rockstar...
Israeli Spies Hacked Kaspersky and Found Russian Hackers Exploiting the Antivirus software to Obtain US Intelligence Secrets. We earlier reported that Russian...
An Android Malware Family called “ZNIU” Discovered that Exploits the Dirty COW Vulnerability into Android Platform and it performs silent Attacks in...
A Remote Access Trojan (RAT) is one of the most used malicious software used by cybercriminals to target unsuspecting users. Based on its...
According to UnicornTeam, a group of Chinese researchers from country’s leading security firm 360 Technology, there is a dangerous vulnerability in 4G...
The Researchers have detected a new trojan horse this is spreading via SMB, but not like the malicious program additives of the...
Today, the Shadow Brokers have published a new message teasing new exploits for people who register for a new membership program the...
The Sednit group, also known as APT28, Fancy Bear and Sofacy, is a group of attackers operating since at least 2004 and...
Sednit is back - this time with two more zero-day exploits embedded in a phishing email titled Trump's_Attack_on_Syria_English.docx.
Malware researchers at security firm ProofPoint reported the Chinese TA459 APT has exploited the CVE-2017-0199 vulnerability to target Financial firms. The notorious...
The developer of the AES-NI ransomware claims that the recent “success” he’s been enjoying is due to the NSA exploits leaked last...
On Good Friday and ahead of the Easter holiday, the Shadow Brokers have dumped a new collection of files, containing what appears...
Hot topics now trending is the leak of thousands of documents from CIA’s vault 7 series of documents, these leaks are continuously exposing...
Exploits and Security Tools Framework 2.0.0 (Credits C0reL0ader) http://eastfw.com/ «EAST» – «Exploits And Security Tools» penetration testing framework. Overview Pentest framework environment...
RCE_FINDER How to use root@kali:/rce_finder # python scan_rce.py # LOGO ########################################## #| By Rudra Sarkar - @rudr4_sarkar # #| Loaded Modules :...
Linux has long been the preferred operating system for enterprise platforms and Internet of Things (IoT) manufacturers. Linux-based devices are continually being...
Yesterday WikiLeaks printed thousands of documents revealing prime United States intelligence agency CIA Cyber Security hacking secrets, as well as the agency’s...
DAVScan Credits: Graph-X Download Davscan DAVScan is a quick and lightweight webdav scanner designed to discover hidden files and folders on DAV...