WebDAV(Web Distributed Authoring and Versioning) is the extended framework of HTTP protocol which includes more features such as clients can …
Global Law Enforcement Agencies shutdown the Largest and Dangerous Andromeda Botnet
Andromeda Botnet dismantled after the joint investigation with law enforcement agencies around the Globe.The takedown took place on 29 November …
Nadine Dorries faces backlash over lax attitude to cybersecurity
According to an MP, it’s common to share one’s login passwords with their colleagues in the House of Commons. Defending …
Cr3dOv3r – Credential Reuse Attack Tool
Cr3dOv3r is a fairly simple Python-based set of functions that carry out the prelimary work as a credential reuse attack …
Hacked Passwords Reselling Website Leakbase Goes Offline
Leakbase a website that resells the hacked passwords exfiltrated from most significant data breach went offline.It contains more than two …
Xerosploit – Toolkit to Perform MITM, Spoofing, DOS, Images Sniffing/Replacement, WD Attacks
In this Kali Linux Tutorial, we are to work with Xerosploit. Xerosploit is a penetration testing toolbox whose objective is …
Paypal Acquired Company TIO Networks Suffered a Data Breach that Impacts 1.6 Million Customers
PayPal confirmed the suspension of operation with TIO Networks, as they identified unauthorized access to the servers that store customers …
Wall Street embraces bitcoin to trade futures on exchanges
Bitcoin’s stratospheric rise this week follows the digital currency’s embrace by mainstream trading platforms and is seen by some in …
Beware!! PayPal Phishing Attack cleverly Tricks you and Asks to Verify Transactions
Newly spreading PayPal Phishing Attack Tricking the user into verifying the Transactions details via Email medium and it looks like a completely …
Blind spot in the Bermuda (CIA) Triangle – Security Challenge with Organisation Insider Threats
Inspection in detail is available for Packet’s behaviour, but unfortunately, there is no possibility or means to inspect a person’s …