Kali Linux 2019.4 Hacking OS Comes With An Undercover Mode

The Debian-based Linux distribution Kali Linux is getting its final update for this year. Kali Linux 2019.4 is available for download for penetration testers and ethical hackers. The latest version of Kali Linux comes with a lot of interesting features such as a new desktop environment, a new theme, and the longed-for undercover mode that […]

Udemy Black Friday Sale 2019: Best Hacking Courses For Just $9.99

Black Friday is an opportunity to grab the best deals and purchase items at discounted prices. Black Friday 2019 is just a day away and many companies have already started its Black Friday deals. For those who want to learn on the internet, Udemy’s Black Friday 2019 sale is an opportunity to grab courses at […]

Chrome, Edge, Safari were beaten by white hats in Chinese hacking contest

Last weekend, the Chinese hacking contest, Tianfu Cup officially began in Chengdu, and hackers from China won the championship in this war. In two days, Chinese hackers attacked popular software using the vulnerabilities they discovered. The goal of the game is to exploit the vulnerabilities that have not yet been discovered to attack the software […]

Police confiscate surveillance van loaded with hacking tools

Earlier this year, the Israeli owner of the van demonstrated how hacking tools in his surveillance van were capable of hacking any smartphone. If there’s one thing that can be detrimental to any cybersecurity expert, it is bragging. Sure, you may have bragging rights but using them can land you in very hot waters – […]

5 Reasons to Learn Ethical Hacking

Ethical hacking sounds like an oxymoron, doesn’t it? Aren’t hackers are anything but ethical?: Some spend their days penetrating business’ systems, stealing information, holding it to ransom, and consequently damaging a victims’ reputation. At least, that’s what we’re made to believe from the media. Of course, there are ethical hackers out there. In fact, for many […]

Chinese Hackers Win $382,500 For Hacking KVM On Ubuntu, Edge, Adobe Reader

In 2018, the Chinese government barred Chinese security researchers from participating in hacking contests in foreign countries in a bid to keep the knowledge of disclosing software vulnerabilities in China itself. The decision affected popular hacking contests like Pwn2Own that were mostly dominated by Chinese participants. As a response to the ban, the Chinese government […]

Evil-Winrm v1.9 – The Ultimate WinRM Shell For Hacking/Pentesting

This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol. A standard SOAP based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators. This program can […]

Beware! World’s Most Notorious Hacking Group Launches New Trojan

Platinum, the infamous Advanced Persistent Threat (APT) group, has launched a new backdoor trojan named Titanium that has advanced capabilities of taking complete control over the target’s PC. As reported by the Kaspersky Lab researchers, Titanium is capable of hiding in plain sight by disguising itself as a DVD burner software, sound driver, or even […]

DarkUniverse – A Weaponized APT Framework Found via Interesting Script that Used in NSA Hacking Attack

Researchers found the existence of the new APT Framework named “DarkUniverse” using Tips from a script that used in the NSA breach in 2017 in which, shadow brokers published their well-known ‘Lost in Translation’ Hacking tools leak. “Lost in Translation” cyber-espionage campaign leaked some of the deadliest exploits such as DarkPulsar, Eternal Blue that cause […]

Hacking FIFA: Who and how should be bribed in order to organize a World Cup? Russia did it in 2018

Although it finished over a year ago, the FIFA World Cup Russia 2018 is still linked to various controversies over information leaks and corruption cases. According to information security specialists, some documents with detailed profiles on several FIFA officials were published through the BlackMirror Telegram channel, specifying how and to whom the Rusian committee should […]

Hacking IOT devices – Part 1

IOT (Internet of things) which makes our life way easier. As it reduces to do human efforts. You can control all your devices with your Android/ IOS Mobiles. You can make any electrical appliance by just adding an IOT module or IOT devices. According to ethical hacking researcher International Institute of Cyber Security, IOT are […]

Facebook Sues Israeli NSO Spyware Firm For Hacking WhatsApp Users

Finally, for the very first time, an encrypted messaging service provider is taking legal action against a private entity that has carried out malicious attacks against its users. Facebook filed a lawsuit against Israeli mobile surveillance firm NSO Group on Tuesday, alleging that the company was actively involved in hacking users of its end-to-end encrypted […]

Texas Man is in Jail for Hacking the Superior Court for 145 Months

A Texas man found guilty of hacking and abusing the LASC network for sending phishing emails was sentenced to a federal prison this week. The man, Oriyomi Sadiq Aloba, 33, from Katy, Texas, was found guilty of saving around 2 million malicious emails and hundreds of credit card names with the hacked LASC computer system. […]

FIN7 APT Hackers Added New Hacking Tools in Their Malware Arsenal to Evade AV Detection

Researchers discovered 2 new hacking tools called BOOSTWRITE and RDFSNIFFER that were added in FIN7 groups malware arsenal with sophisticated capabilities and techniques. FireEye Mandiant investigators uncovered that these new hacking tools were added for hijacking the DLL load order of the legitimate Aloha utility and load the malware. The Tool named BOOSTWRITE is a […]

Hacked Programmer Retaliates By Hacking Hackers Who Hacked Him

Everything you do comes back to you. It’s called karma – This stood true for a hacker who hacked a programmer and got hacked by him in return. Germany-based programmer Tobias Fromel who was affected by Muhstik ransomware, released around 3,000 decryption keys as well as the free decryptor software which he acquired by hacking the […]

Microsoft Reveals How “Phosphorus” Tried Hacking US Presidential Campaign

As recently found out by Microsoft, an Iran-based threat group — Phosphorus — tried to hack the 2020 US Presidential Campaign. The discovery was made by the Microsoft Threat Intelligence Centre (MTIC). New Security Threat As per the official blog, Phosphorus hacking group made around 2,700 attempts to pick out email accounts that were associated […]

PKPLUG -New Research Found Same Chinese Hacking Group Involved with Multiple Cyber Attacks Across Asia

Researchers linked multiple Cyber-espionage campaigns across Asia to the threat actor group PKPLUG. The group uses its PlugX malware and the number of additional payloads in the campaign. The group primarily targets Southeast Asia regions such as particularly Myanmar, Taiwan, Vietnam, and Indonesia and other parts of Asia such as Tibet, Xinjiang, and Mongolia. Based […]