A Russian national namely Peter Yuryeich Levashov has pleaded guilty to operating the Kelihos botnet, which was used to launch a huge...
A cyber espionage APT group called Lazarus hits the cryptocurrency exchanges using fake installer and macOS malware using variously sophisticated techniques. Lazarus...
Supply Chain Attacks occurs is an advanced threat that determines the weak link in the supply chain to infiltrate into the organization...
Fraud events in e-commerce are increasing Bad news for Australian online shoppers: the number of online scams increases steadily. According to cyber...
The Operative Framework tool can be used within a red team/social engineering engagement to collect information regarding websites and enterprises. The tool...
This is a simple tool to gather information, based on Operative-Framework. Requirements requests pythonwhois beautifulsoup4 Install requirements $ pip install -r requirements.txt...
Earlier this year, a bug in Google Chrome was a rejoice for tech support scammers who could freeze people’s browser using the...
Symantec, a software developer, claims to have discovered a cyber espionage campaign focused on infiltrating three telecom operators in Southeast Asia,...
Commonlly used technology for ship monitoring can be hacked to falsify the location and size of boats for the purpose of firing...
Another day, another DDoS attack causing passengers a great deal of trouble. The largest train operating company in Danmark “Danske Statsbaner” (DSB...
EE, a British mobile network giant owned by BT Group has been accused of leaving a critical code repository on an open-source tool protected...
Administrators of DDoS-for-hire Service were arrested as a result of a joint Operation Power OFF led by the Dutch police, and UK’s...
Author: Colin Harper Litepay, a Litecoin-specific payment processor, is closing up shop–until it finds a buyer, that is. According to a blog...
Wondering which is the best operating system for ethical hacking and pen testing purposes? Trying to solve this problem, Fossbytes has prepared...
A new cyber attack called “Operation Honeybee” deploying the SYSCON Backdoor Using MS Word to attack the humanitarian aid organizations. An SYSCON backdoor...
Whonix is a free and open-source desktop operating system (OS) that is specifically designed for advanced security and privacy. Based on Tor,...
A hacking tool that was able to give full remote control of a victim’s computer to anyone with nefarious intentions has been taken...
The investigation showed that the tool, which required little technical knowledge to deploy, had over 8,600 users in 78 countries. Victims are...
Last month Opera introduced its browser’s 50 beta version with built-in cryptocurrency mining blocker for desktops. Now, the company has launched anti-cryptocurrency...
One-Lin3r is simple and light-weight framework inspired by the web-delivery module in Metasploit. It consists of various one-liners that aids in penetration...
Canadian authorities have arrested and charged a 27-year-old Ontario man for allegedly selling billions of stolen passwords online through the now-defunct service Leakedsource.com....