Warning as small planes found vulnerable to hacking

The IT security researchers at Rapid7 have reported a critical vulnerability in the modern flight systems of small planes allowing hackers with physical access to take control of targeted aircraft. The US Department of Homeland security’s Cybersecurity and Infrastructure Security Agency (CISA) has also acknowledged the issue. The security advisory issued Tuesday stated that the vulnerability […]

After Hacking 250M Accounts, TrickBot Trojan Can Now ‘Disable’ Windows Defender

If you are someone who relies on “Windows Defender” on Windows 10 to protect your device from malware threats, you should know about the new version of TrickBot malware that attempts to disable the antivirus software altogether. TrickBot Trojan isn’t exactly new as it surfaces from time to time. The last we heard about TrickBot was […]

CryptoCurrency Breaches and Hacking Scandals: How to Address them?

The proponents of cryptocurrency always harp on the point that it is very safe and secure and the blockchain technology that is used is virtually hacking proof. Let’s face it, even with the best technology you will have loopholes and there are people everywhere who wish to make a profit out of it. Every small […]

fsociety Hacking Tools Pack – A Penetration Testing Framework

Fsociety Hacking Tools Pack A Penetration Testing Framework, you will have every script that a hacker needs   Fsociety Contains All Tools Used in Mr. Robot Series     Menu Information Gathering Password Attacks Wireless Testing Exploitation Tools Sniffing & Spoofing Web Hacking Private Web Hacking Post Exploitation Contributors Install & Update Information Gathering: Nmap […]

Most Popular Malware & Hacking Tools that are Advertised in Underground Hacking Forums

The Underground hacking Forums are the market place for cybercriminals to advertise various malware variants and other hacking tools. A new report represents the top malware families advertised. By analyzing more than 3.9 million posts, Recorded Future’s, Insikt Group identified the top malware variants that are advertised in the hacking and it’s a correlation with […]

Hacking attempt against Ubuntu source code to install a backdoor

IT systems audit experts report an alleged hacking attack against the GitHub account of Canonical Ltd, the company in charge of Ubuntu, the popular Linux distribution, allegedly with the intention of installing a backdoor. “Last July 6, the access credentials to one of the GitHub accounts owned by Canonical were compromised; those responsible for this […]

YouTube Bans ‘Hacking And Phishing’ Videos; Pisses Off Infosec Guys

As the number of users on the platform has increased over the years, so has YouTube’s list of ‘banned content.’ Adding further to the list, YouTube has banned ‘instructional hacking and phishing’ videos. The latest bans have led to the deletion of several educational videos on ethical hacking as they now violate YouTube’s Terms of […]

Mobile Hacking Firm Cellebrite’s New Premium Tool can Hack & Extract Data From All iOS and High-end Android Devices

Israeli forensics firm and well-known Law enforcement contractor Cellebrite released a public statement that they can hack any iOS and High-end Android devices for law enforcement agencies. Cellebrite Mobile Synchronization is an Israeli company that manufactures data extraction, transfer and analysis devices for cellular phones and mobile devices. Last year Cellebrite claimed that it’s engineer’s have […]

Telegram suffers DoS attack; the company says the China government is behind the hacking

The instant messaging service Telegram suffered a denial of service (DoS) attack this Wednesday; through Twitter, the company unveiled the incident, mentioning that users might experience some connection problems when using the service. According to web application security experts, the company’s CEO has pointed to the Chinese government as responsible for the incident. Pavel Durov, […]

Vulnerability in Linux allows hacking a system by simply opening a Vim file

The website security expert Armin Razmjou has reported the finding of remote command execution vulnerability in Vim and Neovim, considered a high severity flaw. The compromised tools are the most powerful and used to edit command lines and are pre-installed on most Linux-based operating systems. On Linux systems, the Vim editor allows users to create, […]

This guy earned 1 million USD from ATM hacking of 500 bank accounts

A Romanian citizen was sentenced to 65 months in prison for operating a payment card fraud scheme using an attack variant known as “skimming“. According to experts in IT systems audit, the defendant and his accomplices stole more than $850k USD, emptying the bank accounts of more than 500 people. Bogdan Viorel Rusu, 38 years […]

A Complete Penetration Testing & Hacking Tools List for Hackers & Security Professionals

Penetration testing & Hacking Tools are more often used by security industries to test the vulnerabilities in network and applications. Here you can find the Comprehensive Penetration testing & Haking Tools list that covers Performing Penetration testing Operation in all the Environment. Also Read: Penetration Testing Cheat Sheet For Windows Machine – Intrusion Detection Penetration Testing […]

Top 10 Best Operating System for Ethical Hacking & Penetration Testing – 2019

Operating system for Ethical Hacking and Penetration Testing with Linux distro is dedicatedly developed for Security Researchers or Ethical Hackers to perform various operations in security industries with variety of hacking tools that prebuilt with OS. Linux is open source it gives you the freedom to choose your own operating system. For that, a lot […]

Hacking vs Spying: How Puzzling it is to Find the Hackers in Cyber World

The cyber world is a weird world and cell phones have added a new dimension to it. You can’t judge your friends and enemies in this virtual world. The proliferation of mobile devices in our lives have handed new life to the spies and hackers to Hacking target handsets and covertly gain information. Hackers and […]

Iranian MuddyWater APT Hackers Adds New Exploits in Their Hacking Arsenal to Attack Government Networks

Threat actors from MuddyWater APT groups now add a new set of latest exploits to their hacking arsenal and tactics, techniques and procedures (TTPs) to target government entities and telecommunication sectors. Iran sponsored MuddyWater group operating by advanced persistent threat actors and this APT group was initially spotted in 2017, they are mainly targeting the […]

China is hacking universities from India, U.S. and Australia

Intelligence agencies and web application security experts claim that China may be behind the recent data breach incidents that have compromised the information of thousands of students, teachers, and administrative staff in some India, Australia and U.S. universities. Media from various countries reported that important members of China’s intelligence agencies have been deploying a hacking […]

TA505 Hackers Group Modifies Remote Admin Tool as a Weaponized Hacking Tool To Attack Victims in the U.S, APAC, Europe

Threat actors from TA505 hacking group conducting new wave attack by modifying the legitimate remote admin tool to Weaponized hacking tool that targets retailers in the U.S, and various financial institutions from Europe, APAC and LATAM. TA505 hacking group believed to reside in Russia and the threat actors from this group involved in various high […]

Hacking Your Smart Home: How to Prevent Intrusion

Today, humans aspire to equip their homes with as much smart technology as possible, check here for some great condos that come equipped with the latest smart home security systems. There are many internet-connected devices such as kettles, baby monitors and security systems, the list is getting lengthier each day. However, all these devices render […]