In total, DDoSecrets has leaked 70 GB worth of sensitive data belonging to registered Gab users. Note: Article has been corrected/edited with...
Scientists from European Universities have disclosed a vulnerability in Intel processors that could allow hackers to steal crypto keys by modifying CPU...
Ffuf – Fuzz Faster U Fool is a great tool used for fuzzing. It has become really popular lately with bug bounty...
Security Researchers have found vulnerabilities in ten popular Android devices that can be exploited to snoop on device owners using Bluetooth and...
Researchers uncovered an information-stealing malware called Raccoon that delivered by the Fallout and RIG Exploit Kits to steal sensitive data from compromised victims’ devices. Raccoon malware...
Australia Holds World’s First Hackathon to Find Missing Persons. Whether hacking can be ethical or not, it is still a debatable point...
Turla APT threat actors distribute a new malware called Reductor, a successor of COMpfun to compromise the TLS encrypted web traffic and...
29 percent of small to medium-sized businesses (SMBs) spend less than $1,000 for their IT security each year. This comes as a...
Spear-Phishing Even with the number of messaging apps available now, companies still use email. On average, a person receives over a hundred...
The search engines allow users to find any content via the world wide web. It helps to find any information easily and...
Threat actors from TA5O5 APT groups distribute malicious spam email campaigns with a new set of malware tools via attached malicious word...
The information security analyst is an important role in any organization, since they keep sensitive information secure. They work with the different...
Infamous Chinese APT 10 hackers compromised over 10 Telecom networks around the world under the campaign called Operation Soft Cell and stealing various...
According to the report, the hack took place back in 2018 after an unauthorized Raspberry Pi device connected to NASA’s JPL servers...
In January, it was reported that hackers were taking control of Instagram influencers’ accounts and other accounts with valuable handle names. Some...
A critical flaw that affected Evernote’s web clipper extension for Chrome could have impacted millions of users. Reports say that the critical...
Computer Forensics tools are more often used by security industries to test the vulnerabilities in network and applications by collecting the evidence...
Intelligence agencies and web application security experts claim that China may be behind the recent data breach incidents that have compromised the...
Threat actors from TA505 hacking group conducting new wave attack by modifying the legitimate remote admin tool to Weaponized hacking tool that...
Cybercriminals from Sednit group, also known as Fancy Bear, APT28, Sofacy launching new Zebrocy Malware that indented to open backdoor on the...
Hackers come in many forms with sophisticated Hacking Techniques, While there has been a lot of discussion about online security in recent...