Browsing tag

Cyber Security

A Malware Showcase | Understanding Malware With Python

Malware showcase is a Github repository that contains examples of malware usage and behavior, this repo should be used only for educational purposes or for experts who wish to expand on the usage for red team or other related ethical hacking activities. Installation N.B: We will need to set up a virtual environment 1 – […]

Patches for 2 Severe LibreOffice Flaws Bypassed — Update to Patch Again

If you are using LibreOffice, you need to update it once again. LibreOffice has released the latest version 6.2.6/6.3.0 of its open-source office software to address three new vulnerabilities that could allow attackers to bypass patches for two previously addressed vulnerabilities. LibreOffice is one of the most popular and open source alternatives to Microsoft Office […]

SniffAir – An Open Source Wireless Security Framework

SniffAir is an open source tool made for sophisticated wireless attacks and data capture, it handle all types of pcap files and analyze traffic through the network interface whilst looking for potential security flaws with prebuild queries. It also allows users to create custom queries for analyzing wireless data with its prebuild SQL database Installation […]

Canon DSLR Cameras Can Be Hacked With Ransomware Remotely

The threat of ransomware is becoming more prevalent and severe as attackers’ focus has now moved beyond computers to smartphones and other Internet-connected smart devices. In its latest research, security researchers at cybersecurity firm CheckPoint demonstrated how easy it is for hackers to remotely infect a digital DSLR camera with ransomware and hold private photos […]

Meet AttackSurfaceMapper; new automated penetration testing tool

Last week, Capital One breach shocked the IT security community after it was revealed that a wannabe hacker was able to steal and brag about personal and financial details of over 106 million users. The incident also highlighted the fact that penetration testing has become more critical than ever. If you’ve had the chance to […]

How to write an information security analyst job description

One of the diverse critical tools in the human resource department is a job description. It’s one of the paramount tools that aid in an employer’s staffing programs. Job description usually stipulates the duties, responsibilities any relevant skills required, the level of training and education needed for the job. Job descriptions don’t just come into […]

Protecting Your Network & PC From The Impending Threat of Ransomware

Digital extortion continues to pose a threat everywhere. According to the Cyber Advisor newsletter, incidents of ransomware attacks are only going to skyrocket and increase manyfold.  The level of threat has only escalated with military-grade hacking techniques used to target entire geographies, large scale corporations, hospitals, schools and just about anyone with an internet connection […]

Internet connected cars can be hacked to gridlock major cities

Hacking Internet Connected Cars – a near possibility for cybercriminals to cause major havoc. With the advent of the 21st century, we saw great technological feats arise – thanks to the internet. But something far beyond its initial use-case has emerged in recent years with a phenomenon termed the Internet of Things (IoT). Everything today […]

Capital One Data Breach Affects 106 Million Customers; Hacker Arrested

Another week, another massive data breach. Capital One, the fifth-largest U.S. credit-card issuer and banking institution, has recently suffered a data breach exposing the personal information of more than 100 million credit card applicants in the United States and 6 million in Canada. The data breach that occurred on March 22nd and 23rd this year […]

What Is The True Score of AI VS Malware?

We admit here in hackercombat.com, we are one of the cybersecurity news organizations that somewhat hyped Artificial Intelligence (AI) when it comes to cybersecurity. We wrote numerous articles heralding the “hero” that will save us from the seemingly endless cat and mouse race between discovering a vulnerability that is currently exploited, and the time the […]

10 Powerful But Not Yet Promoted Antivirus for PC, Mac, Android, iPhone

The vulnerability of the regular computer user is at an all-time high. Not even the strongest of world governments have been able to stay safe from attacks, unauthorized accesses, and data leakages attempted by hackers, malware programs. The big question, then, that every computer and Internet user needs to ask is – is the current […]

10 Best Hacker-Friendly Search Engines of 2019

The search engines allow users to find any content via the world wide web. It helps to find any information easily and is a web-based tool that allows someone to discover or detect any data. Here are the best Hackers Search Engines. There are various search engines which are available online, hackers use. So we […]

Most Important Steps to Keep Your Mobile Safe From Sophisticated Cyber Threats

Mobile phones have become a part of everyday life, and their functionality continues to develop at a rapid pace. You can switch from monitoring work emails to playing the latest games, to live streaming sports events simultaneously. Improved high-speed internet and enhanced connectivity indicate that we’re also connected more than ever before and continuously online, […]

5 Keys to Improve Your Cybersecurity

Cybersecurity isn’t easy. If there was a product or service you could buy that would just magically solve all of your cybersecurity problems, everyone would buy that thing, and we could all rest easy. However, that is not the way it works. Technology continues to evolve. Cyber attackers adapt and develop new malicious tools and […]

The Growing Importance of Cyber Security Skills

Cyber attacks are on the rise and it isn’t just the large corporations who are targeted, anyone who does anything online is at risk of being exposed or hacked. The problem with digital crimes is that the culprit could be continents away. However, it isn’t just the hackers that you need to be wary of. […]

Best Cyber Security Certifications 2019

Today, Cyber security is one of the fastest growing industry. The increasing numbers of the data breaches and cyber attacks have likewise increased the need for cyber security professionals to take defensive measures against these threats. Organizations are spending more and more on securing their data and hiring cyber security experts. They are also promoting […]

Hackers Infect 50,000 MS-SQL and PHPMyAdmin Servers with Rootkit Malware

Cyber Security researchers at Guardicore Labs today published a detailed report on a widespread cryptojacking campaign attacking Windows MS-SQL and PHPMyAdmin servers worldwide. Dubbed Nansh0u, the malicious campaign is reportedly being carried out by an APT-style Chinese hacking group who has already infected nearly 50,000 servers and are installing a sophisticated kernel-mode rootkit on compromised […]

Flipboard Database Hacked — Users’ Account Information Exposed

Flipboard, a popular social sharing and news aggregator service used by over 150 million people, has disclosed that its databases containing account information of certain users have been hacked. According to a public note published yesterday by the company, unknown hackers managed to gain unauthorized access to its systems for nearly 10 months—between June 2, […]