Browsing tag

hackers

Hackers Can Tweak Intel CPU Voltage To Steal Cryptocurrency

Scientists from European Universities have disclosed a vulnerability in Intel processors that could allow hackers to steal crypto keys by modifying CPU voltage. The attack dubbed Plundervolt can raid Intel’s Software Guard Extension (SGX), which is a secure CPU environment that encrypts certain parts of memory, and only specific programs are allowed to access it. […]

Ffuf (Fuzz Faster U Fool) – An Open Source Fast Web Fuzzing Tool

Ffuf – Fuzz Faster U Fool is a great tool used for fuzzing. It has become really popular lately with bug bounty hunters. Ffuf is used for fuzzing Get and Post data but can also be used for finding hidden files, directories or subdomains. Installation and usage  Clone the github repository and change the current […]

These 10 Android Devices Can Be Hacked Into Spying On Their Owners

Security Researchers have found vulnerabilities in ten popular Android devices that can be exploited to snoop on device owners using Bluetooth and USB accessories. The vulnerabilities are in the AT commands that are used to communicate with the baseband software in Android smartphones. Hackers can use this to gain IMEI and IMSI numbers, intercept calls, […]

Russian Hackers Compromised 100,000+ Computers Using Raccoon Malware Via Fallout & RIG Exploit Kits

Researchers uncovered an information-stealing malware called Raccoon that delivered by the Fallout and RIG Exploit Kits to steal sensitive data from compromised victims’ devices. Raccoon malware reportedly hacked more than 100,000 computers around the world since April 2019, and the malware believed to be delivered from a team of Russian hackers. Malware doesn’t use any stealthy infection technique, and […]

Authorities use hackers to find missing persons

Australia Holds World’s First Hackathon to Find Missing Persons. Whether hacking can be ethical or not, it is still a debatable point but law enforcement agencies in Australia have come up with an interesting new way to utilize hackers’ skills for societal welfare. Reportedly, Australian Federal Police took 354 hackers and investigators from all over […]

Turla APT Hackers Using New Malware to Break The TLS Encrypted Web Traffic Communication

Turla APT threat actors distribute a new malware called Reductor, a successor of COMpfun to compromise the TLS encrypted web traffic and infect the targeted network. Reductor malware has exclusive RAT functionality with the ability to such as uploading, downloading, and executing files on victims’ networks by manipulating digital certificates. Researchers believe that the malware […]

Spear-Phishing: How to Protect Yourself From an Attack

Spear-Phishing Even with the number of messaging apps available now, companies still use email. On average, a person receives over a hundred emails a day from bosses and companies. Because of this, hackers have created a dangerous phishing method called “spear-phishing.” What is phishing and spear-phishing? Phishing is a popular cyber-attack method created in the […]

10 Best Hacker-Friendly Search Engines of 2019

The search engines allow users to find any content via the world wide web. It helps to find any information easily and is a web-based tool that allows someone to discover or detect any data. Here are the best Hackers Search Engines. There are various search engines which are available online, hackers use. So we […]

TA505 APT Hackers Launching New Malware Tools via MS Office Docs to Steal Emails & SMTP Credentials

Threat actors from TA5O5 APT groups distribute malicious spam email campaigns with a new set of malware tools via attached malicious word and excel documents. TA505 hacking group believed to reside in Russia and the threat actors from this group involved in various high profile cyber attacks including infamous Dridex, Locky ransomware, ServHelper malware, FlawedAmmyy, […]

Definition and Importance of an Information Security Analyst

The information security analyst is an important role in any organization, since they keep sensitive information secure. They work with the different departments to find and correct any flaw with the organization’s security solutions and programs. They are also responsible for recommending ways to improve overall security. Responsibilities of an Information Security Analyst: Overall, the […]

Chinese APT 10 Group Hacked Nearly 10 Telecom Networks and Stealing Users Call Records, PII, Credentials, Email Data and more

Infamous Chinese APT 10 hackers compromised over 10 Telecom networks around the world under the campaign called Operation Soft Cell and stealing various sensitive data including call records, PII, and attempting to steal all data stored in the active directory. APT 10 Threat actors known as one of the sophisticated hacking group in the world and […]

Hackers exploit Raspberry Pi device to hack NASA’s mission system

According to the report, the hack took place back in 2018 after an unauthorized Raspberry Pi device connected to NASA’s JPL servers was targeted by hackers Note: The headline of this article has been changed. The previous one stated that hackers used a Raspberry Pi device to hack into NASA’s system which was not correct. […]

Evernote Critical Flaw Could Have Impacted Millions of Users

A critical flaw that affected Evernote’s web clipper extension for Chrome could have impacted millions of users. Reports say that the critical flaw in the popular note-taking extension Evernote could have led to the breach of personal data of over 4.6 million users. Hackers could have exploited the vulnerability to steal personal data including emails […]

Most Important Computer Forensics Tools for Hackers and Security Professionals

Computer Forensics tools are more often used by security industries to test the vulnerabilities in network and applications by collecting the evidence to find an indicator of compromise and take an appropriate mitigation Steps. Here you can find the Comprehensive Computer Forensics tools list that covers Performing Forensics analysis and respond to the incidents in all […]

China is hacking universities from India, U.S. and Australia

Intelligence agencies and web application security experts claim that China may be behind the recent data breach incidents that have compromised the information of thousands of students, teachers, and administrative staff in some India, Australia and U.S. universities. Media from various countries reported that important members of China’s intelligence agencies have been deploying a hacking […]

TA505 Hackers Group Modifies Remote Admin Tool as a Weaponized Hacking Tool To Attack Victims in the U.S, APAC, Europe

Threat actors from TA505 hacking group conducting new wave attack by modifying the legitimate remote admin tool to Weaponized hacking tool that targets retailers in the U.S, and various financial institutions from Europe, APAC and LATAM. TA505 hacking group believed to reside in Russia and the threat actors from this group involved in various high […]

Compromised Docker Hosts Use Shodan for Cryptocurrency Mining

Researchers have detected a campaign in which compromised docker hosts use Shodan for carrying out cryptocurrency mining. Hackers scan for Docker hosts with exposed APIs and use them for cryptocurrency mining, which is done by deploying malicious self-propagating Docker images that are infected with Monero miners and scripts which use Shodan for finding vulnerable targets. […]

Ransomware Attack Impacts Baltimore Emails, Online Payments

Some key online operations in the U.S city of Baltimore have been impacted following a ransomware attack. Reports reveal that all online payment gateways and emails have been totally affected, bringing them all to a standstill, in Baltimore following a ransomware attack that happened in the first week of May. The hackers who have launched […]