British and Dutch data protection regulators Tuesday hit the ride-sharing company Uber with a total fine of $1,170,892 (~ 1.1 million) for...
Google, the FBI, ad-fraud fighting company WhiteOps and a collection of cyber security companies worked together to shut down one of the...
The Department of Justice announced Wednesday charges against two Iranian nationals for their involvement in creating and deploying the notorious SamSam ransomware....
Multinational computer technology company Dell disclosed Wednesday that its online electronics marketplace experienced a “cybersecurity incident” earlier this month when an unknown...
The World’s most popular question-and-answer website Quora has suffered a massive data breach with unknown hackers gaining unauthorized access to potentially sensitive...
Looking for how to hack WiFi password OR WiFi hacking software? Well, a security researcher has revealed a new WiFi hacking technique that...
It is no secret how miserably Microsoft’s 3-year-old Edge web browser has failed to compete against Google Chrome despite substantial investment and...
Developers around the world depend on open source components to build their software products. According to industry estimates, open source components account...
Cybersecurity researchers have discovered a new zero-day vulnerability in Adobe Flash Player that hackers are actively exploiting in the wild as part...
Hold tight, this may blow your mind… A low-privileged user account on most Linux operating systems with UID value anything greater than...
A new piece of ransomware is spreading rapidly across China that has already infected more than 100,000 computers in the last four...
Looking for an automated malware analysis software? Something like a 1-click solution that doesn’t require any installation or configuration…a platform that...
MassExploitConsole is a python based easy-to-use cli tool for executing exploits. It has a collection of exploits to execute, built-in scanner for...
Kalitorify is a shell based script for Kali Linux. It uses iptables and TOR to create a transparent proxy. In simple terms,...
As reported by SC Magazine, a U.K./Nigerian cybergang has accumulated a list of more than 50,000 corporate executives to be targeted in...
Knock is a python based tool for enumerating subdomains on a targeted domain. You can use a custom wordlist and also you...
This may sound strange, and to an extent startling as well. A hacker could steal data from your system (which would already...
Based on python, the Veil-Framework is one of the most popular tools for Anti-Virus evasion. You can generate many different Metasploit payloads...
The Cybersecurity-related profession is a very dynamic, too dynamic in fact that many in the industry are not formally educated to become...
The Evil Access Point (AP) attack has been around for a long time. There are several ways to create this attack and...
Singapore is above average when it comes to the risks of being targeted by cyber attacks, that is the disclosure published in...