Browsing tag

Information Security

China is hacking universities from India, U.S. and Australia

Intelligence agencies and web application security experts claim that China may be behind the recent data breach incidents that have compromised the information of thousands of students, teachers, and administrative staff in some India, Australia and U.S. universities. Media from various countries reported that important members of China’s intelligence agencies have been deploying a hacking […]

Data breach Flipboard; Hackers commit user Information

A security incident in the Flipboard news application allowed malicious users to access the company’s systems for more than nine months; According to specialists in the IICS’s information security course, developers have already begun to notify the impacted users. In the notification that the affected users have received, Flipboard mentions that the threat actors obtained […]

Data breach an Instagram; 50 million registers exposed online

Web application security testing specialists reported the finding of a massive database exposed online containing contact data of millions of Instagram influencers, celebrities, and business accounts. Experts mention that the database was hosted on Amazon Web Services (AWS) and was exposed without any authentication measures, so any user could access the leaked information. When detected, […]

Microsoft update causes restart fails in Windows 10

Previously, information security service specialists reported that the update package for Windows 10 generated some bugs in the updated machines. Now, reports of errors emerge again in the restart process of Windows 10 machines that installed the updates. Although the latest update package does not contain critical bug fixes, there are multiple improvements that need […]

Critical vulnerability in Microsoft remote desktop services; update now

Microsoft has just announced the launch of a set of update patches to correct a critical vulnerability in Remote Desktop services. If exploited, the flaw could quickly spread over the Internet; according to information security services, the vulnerability affects previous versions of Windows, including those that are no longer supported by the company. The vulnerability […]

5.0.8 and previous Linux kernel versions vulnerable to remote code execution

Linux operating system computers running versions prior to 5.0.8 kernel distributions are impacted by a vulnerability exposing systems committed to a wide variety of remote attacks, as reported by information security services experts. A threat actor could exploit the vulnerability that resides in the rds_tcp_kill_sock kernel’s TCO/IP implementation to generate denial-of-service and remote code execution […]

Information Security Risks With Vendors/3rd Parties – How Does it Matter for Banking & Financial Service Lines?

Information Security Risks assisted Business models for banking & financial services(BFS) institutions have evolved from being a monolithic banking entity to multi-tiered service entity. What this means to BFS companies is that they need to be more updated and relevant with regards to technology & the quality of all services provided to their clients. The […]

European Union diplomatic communications got hacked

A group of cybercriminals successfully intervened in European Union’s diplomatic communications for about three years According to specialists in digital forensics from the International Institute of Cyber Security, thousands of messages from European diplomats dealing with issues relating to topics such as American President Donald Trump and world trade were intercepted by a group of hackers […]

Novahot – A Webshell Framework For Penetration Testers

novahot is a webshell framework for penetration testers. It implements a JSON-based API that can communicate with trojans written in any language. By default, it ships with trojans written in PHP, ruby, and python. Beyond executing system commands, novahot is able to emulate interactive terminals, including mysql, sqlite3, and psql. It additionally implements “virtual commands” […]

SearX – Your Own Private Search Engine – Kali Linux 2018.2

Hey Guys, In this video i show you create your own private search engine using Searx. SearX: https://searx.me/ https://github.com/asciimoo/searx Installer Script: https://github.com/mehedishakeel/SearX_Installer/blob/master/SearX_Installer.sh Searx is a free metasearch engine, available under the GNU Affero General Public License version 3, with the aim of protecting the privacy of its users. Searx does not share users’ IP addresses […]

Fsociety Hacking Tools Pack – A Penetration Testing Framework – Kali Linux 2017.3

A Penetration Testing Framework, you will have every script that a hacker needs Fsociety: https://github.com/Manisso/fsociety Menu Information Gathering Password Attacks Wireless Testing Exploitation Tools Sniffing & Spoofing Web Hacking Private Web Hacking Post Exploitation INSTALL & UPDATE Information Gathering: Nmap Setoolkit Port Scanning Host To IP wordpress user CMS scanner XSStrike Dork – Google Dorks […]

Hackers Can Disable House Arrest Ankle Bracelet without Raising Alert

Another blow to the law enforcement agencies – researcher from leading security group hacks his way out of ankle bracelet without raising an alert. In July 2015, we reported how your wearable fitness trackers can be hacked. Now, researchers have demonstrated how easy it is to hack tracking bracelets with no strings attached. [must url=”https://www.hackread.com/unexpected-hacks-defcon-23-black-hat-2015/”]7 Unexpected […]