Other than malware delivery; WinZip vulnerability also lets hackers carry out DNS poisoning and arbitrary code execution. Most of us are pretty...
This is a proof of concept of how a ransomware works, and some techniques that we usually use to hijack our...
The program is designed to obfuscate the shellcode. Currently the tool supports 2 encryption. 1) XOR 2) AES The tool accepts...
The malware encryption service run by a Romanian duo helped hackers embed malicious code in legit software to bypass antivirus tools. In...
According to Microsoft’s Digital Defense report, there has been a massive increase in cyberattacks against unsuspecting users and businesses of all...
What is Online Anonymity? Online anonymity is a concept well known in this tech-based world. From the concept of pseudo IDs...
The attack could have been carried out with a “basic RF transceiver” which would not cost more than a few dollars...
VPN is great for protecting your online privacy but can it protect your data from exposure to malicious elements? This question is...
Utility to find AES keys in running process memory. Works for 128, 192 and 256-bit keys. Usage Open aes-finder.sln solution in...
While VPNs seem like a tool you would only use to access restricted sites in a particular country, the truth is, the...
UFO VPN was caught saving and leaking user logs despite complaining strictly no-log policy. A few days ago Hackread.com covered an incident...
If you are using any of these VPN services, now is the time to call it quits. Yesterday, Hackread.com reported on UFO...
The VPN company in the discussion is a Hong Kong-based UFO VPN owned by Dreamfii HK Limited. Perhaps, the most ironic moments...
Several VPN and proxy servers tout their ability to unblock Netflix or remove its geo-restrictions but, what’s best for you? Traveling or...
Earlier, EncroChat claimed that the company was hit by a malware attack from European law enforcement agencies. Last month, Hackread.com reported the...
Russia is in the midst of a national voting process about important constitutional amendments, and this time the authorities have decided to...
Tool for port forward & intranet proxy, just like lcx/ew, but better Why write?lcx and ew are awesome, but can be...
Much-Awaited Mozilla VPN will be available within weeks. Mozilla has announced to release its highly anticipated virtual private network (VPN) service in...
Signal messenger has introduced a new tool that lets users blur their faces. With the news of NSA tapping various online services...
Please note: We take Vault’s security and our users’ trust very seriously. If you believe you have found a security issue...
Introduction Shellcode, the next phase of successfully finding exploit. Every hackers needs shellcode to compromise the target, your shellcode decides of how...